WorldWideScience

Sample records for older ipv victims

  1. The impact of perceived childhood victimization and patriarchal gender ideology on intimate partner violence (IPV) victimization among Korean immigrant women in the USA.

    Science.gov (United States)

    Kim, Chunrye

    2017-08-01

    Childhood victimization experiences are common among intimate partner violence (IPV) victims. This study examines the link between childhood physical and sexual victimization experiences and adulthood IPV among Korean immigrant women in the USA. As Korean immigrants often use physical punishment to discipline their children, and reporting sexual abuse is discouraged due to stigmatization in this community, cultural factors (e.g. patriarchal values) related to childhood victimization and IPV were also examined. Survey data from Korean immigrant women in the USA were collected. Using a case-control design, we compared 64 Korean immigrant women who have experienced IPV in the past year with 63 Korean immigrant women who have never experienced IPV in their lifetime. The findings of this study reveal that IPV victims, compared with non-victims, experienced higher childhood victimization rates. Logistic regression analysis demonstrated that childhood victimization and patriarchal gender ideology strongly predict IPV victimization among Korean immigrants. However, patriarchal values did not moderate the relationship between childhood victimization and IPV. To prevent IPV among Korean immigrant population, we need to make special efforts to prevent childhood abuse and change ingrained cultural attitudes about child physical and sexual abuse among immigrant communities through culturally sensitive programs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Intimate partner violence: office screening for victims and perpetrators of IPV.

    Science.gov (United States)

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Intimate partner violence (IPV) affects more than 12 million individuals annually. Power and control are central concepts underlying abusive relationships. Physicians may see IPV victims, perpetrators, and their children for annual examinations, as well as for injuries and health conditions associated with abuse. In 2013, the US Preventive Services Task Force recommended that women of childbearing age (ie, 14 to 46 years) be screened for IPV. Brief, validated screening tools, such as the 4-item Hurt, Insult, Threaten, and Scream (HITS), can be used to facilitate screening. Physicians should always assess patients whose medical histories or presenting symptoms or injuries are consistent with abuse. Risk factors for IPV and consequences of abuse include general health conditions (eg, asthma, irritable bowel syndrome), reproductive issues (eg, gynecologic disorders, unintended pregnancies), psychological conditions (eg, depression, sleep disturbances), and risky health behaviors (eg, substance use, poor health care adherence). Tools for identifying perpetrators are under investigation. To prepare the practice to address IPV, physicians should educate themselves and staff and learn about community and national resources. By identifying and responding to IPV, clinicians may be able to reduce IPV and interrupt the intergenerational cycle of violence. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  3. Health and Health Care From the Perspective of Intimate Partner Violence Adult Female Victims in Shelters: Impact of IPV, Unmet Needs, Barriers, Experiences, and Preferences.

    Science.gov (United States)

    Wadsworth, Pamela; Kothari, Catherine; Lubwama, Grace; Brown, Cathy L; Frank Benton, Jennifer

    Intimate partner violence (IPV) predicts poor health for victims and their children, but little is known about the perspective of victims. This study reports the perspectives of adult female IPV victims about the impact of IPV on their health and barriers of health care access for themselves and their children. The majority rated their health as good to excellent (69%). However, 83.5% indicated that IPV negatively affected their health; 53.5% had unmet health care needs. Mental health care was the most common unmet need for women; children's unmet needs were immunizations and preventive care. Transportation difficulties posed the biggest barrier to health care access.

  4. How older persons explain why they became victims of abuse

    DEFF Research Database (Denmark)

    Mysyuk, Yuliya; Westendorp, Rudi Gerardus Johannes; Lindenberg, Jolanda

    2016-01-01

    independently, in residential care facilities and nursing homes. SUBJECTS: six males and 11 females aged 63-90 years. RESULTS: the main causes of abuse identified by older victims themselves were mutual dependency between victim and perpetrator, power and control imbalances, loneliness and a marginalised social...... with the perpetrator. Coping strategies mentioned by victims were seeking informal or professional help and using self-help strategies. CONCLUSION: older victims perceive abuse differently depending on the expected acceptability of the type(s) of abuse experienced and the anticipated stigma associated...

  5. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  6. Support groups for older victims of domestic violence.

    Science.gov (United States)

    Wolf, R S

    2001-01-01

    A 1997 nationwide (US and Canada) search to identify support groups for older victims of domestic violence located 16 sponsored by domestic violence programs and 14 sponsored by aging services. Interviews with group leaders indicated more similarities than differences between the two types of sponsorship in group purpose, leadership, numbers served, content of support group sessions, and success in accomplishing goals. Resistance of elders to participate in a group experience was cited by leaders as a major barrier. Recommendations for future groups include insuring accessibility of meeting site; using a leader and co-leader, at least one of whom is older or familiar with aging issues; allocating resources for recruitment; and seeking a steady source of funding. A policy of collaboration among the state's domestic violence coalition, state unit on aging, adult protective services, and victim assistance program may help in promoting support group development and utilization.

  7. Teenage intimate partner violence: Factors associated with victimization among Norwegian youths.

    Science.gov (United States)

    Hellevik, Per; Øverlien, Carolina

    2016-07-06

    The aim of the present study was threefold: (1) learn more about factors associated with teenage intimate partner violence (IPV) victimization; (2) explore aspects of digital media use in connection with teenage IPV; (3) and compare the impact IPV victimization has on boys and girls. Survey data from 549 Norwegian students, mean age 15.2 years, who had experience(s) with being in intimate relationship(s), were examined. Experiences with psychological, physical, digital, and sexual violence were analyzed. In total, 42.9% of the participants had experienced some form of IPV: 29.1% had experienced digital violence; 25.9% had experienced psychological violence; 18.8% had experienced sexual violence; and 12.8% had experienced physical violence. Factors significantly associated with teenage IPV victimization were female gender, older partners, domestic violence, bullying victimization, low academic achievements, and sending sexual messages via digital media. Girls reported to be significantly more negatively impacted by the victimization than boys. CONCLUSIONS SOME TEENAGERS EXPERIENCE VICTIMIZATION IN THEIR INTIMATE RELATIONSHIPS, AND FOR MANY DIGITAL MEDIA SEEMS TO PLAY A CENTRAL ROLE IN THIS VIOLENCE TEENAGERS WHO EXPERIENCE VICTIMIZATION OUTSIDE THEIR RELATIONSHIPS OR HAVE RISKY LIFESTYLES HAVE A HIGHER RISK OF EXPERIENCING IPV VICTIMIZATION A FOCUS ON TEENAGE IPV, AND ESPECIALLY DIGITAL MEDIA'S ROLE IN THIS VIOLENCE, IS NEEDED IF THIS PUBLIC HEALTH ISSUE IS TO BE COMBATED. © 2016 the Nordic Societies of Public Health.

  8. Implementasi Migrasi Ipv4 Ke Ipv6

    OpenAIRE

    Syafrizal, Melwin; Qamar, Syamsul; Aji, Damawan Bayu

    2013-01-01

    IPv4 yang digunakan di jaringan publik (internet) sudah habis, sehingga kebutuhan koneksi internet baru tidak dapat dilayani. Layanan baru, konten baru, domain name baru, server baru, router baru tidak dapat koneksi ke internet, kecuali menggunakan IPv6. Migrasi IPv4 ke IPv6 bukan hal yang mudah, pengetahuan baru tentang IPv6 perlu dipelajari, kondisi-kondisi yang akan dialami akibat Perubahan IP, mekanisme transisi, atau mekanisme routing perlu dipahami. Cara-cara konfigurasi IPv6 pada berba...

  9. Feminism, status inconsistency, and women's intimate partner victimization in heterosexual relationships.

    Science.gov (United States)

    Franklin, Cortney A; Menaker, Tasha A

    2014-07-01

    This study used a random community sample of 303 women in romantic relationships to investigate the role of educational and employment status inconsistency and patriarchal family ideology as risk factors for intimate partner violence (IPV) victimization, while considering demographic factors and relationship context variables. Sequential multivariate logistic regression models demonstrated a decrease in the odds of IPV victimization for Hispanic women and women who were older as compared with their counterparts. In addition, increased relationship distress, family-of-origin violence, and employment status inconsistency significantly increased the odds of IPV. Clinical intervention strategies and future research directions are discussed. © The Author(s) 2014.

  10. Intimate Partner Violence among Midlife and Older Women: A Descriptive Analysis of Women Seeking Medical Services

    Science.gov (United States)

    Sormanti, Mary; Shibusawa, Tazuko

    2008-01-01

    Although intimate partner violence (IPV) may occur throughout a woman's life course, there has been a paucity of research on the experiences of victimization among midlife and older women. This article examines both the prevalence of IPV among a sample of women ages 50 to 64 (N = 620), who were recruited at an emergency department and primary care…

  11. IPv4-protokollasta siirtyminen IPv6-protokollaan

    OpenAIRE

    Ylituomaala, Jaakko

    2011-01-01

    Tässä työssä tutkitaan IPv6-osoiteavaruutta, sekä IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työssä käydään läpi myös yleisimmät IPv4-yhteensopivat IPv6-reititysmenetelmät. Tutkimuksessa tutustutaan pääpiirteittäin IPv4-osoiteluokkiin, itse osoitteisiin ja IPv4-headeriin. IPv4 osoiteryhmiä on viisi, jotka ovat A, B, C, D ja E. Lisäksi luodaan katsaus IPv4-headerin eri osioihin ja tutustutaan niiden käyttötarkoituksiin. Työssä käydään läpi myös osittain NAT-toiminto. Tu...

  12. IPv6 Essentials

    CERN Document Server

    Hagen, Silvia

    2006-01-01

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure

  13. Transition from IPv4 to IPv6

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far t...... the adoption of IPv6 has come. It also includes a discussion on what but also who the drivers and barriers are, including an examination of the implications of implementing transfer markets for IPv4 addresses.......The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far...

  14. IPv6-protokolla

    OpenAIRE

    Hautanen, Jukka-Pekka

    2012-01-01

    Tämän työn tarkoituksena on tutkia IPv6-protokollaa ja IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työn alussa tarkastellaan IPv6-protokollan historiaa ja tämän hetkistä levinneisyyttä. Työssä paneudutaan tarkemmin IPv6-protokollan pääpiirteisiin: IPv6-protokollan osoitetyypit ja niiden esitystavat, aliverkotus, IPv6-protokollan uudistetun otsikon rakenne ja uudet lisäotsikot. Edellä mainittuja pääpiirteitä verrataan tarvittaessa IPv4-protokollaan, jotta nähdään parannukset...

  15. IPv4 to IPv6 Transformation Schemes

    Science.gov (United States)

    Miyakawa, Shin

    According to the recent observations of IPv4 (Internet Protocol version 4) address allocation status, it will be running out within few years. Consequently, to ensure the continuous extension of the Internet operation, introducing IPv6 (Internet Protocol version 6) protocol is surely needed. But at the same time, such transformation must be “smooth” for every Internet users and be compatible with today's IPv4 based practices. This paper describes several techniques and usage scenario which are discussed mainly in the IETF — Internet Engineering Task Force — and tried to be implemented as prototype products to transform today's Internet towards the IPv6 based one.

  16. IPv6 Testing

    National Research Council Canada - National Science Library

    Landis, Christopher B

    2006-01-01

    .... The DoD is also forming working relationships to conduct testing and share information. IPv6 was developed to resolve the issues of IPv4, mainly the limited amount of addresses and lack of security...

  17. IPv6:n tietoturvaominaisuudet

    OpenAIRE

    Sorsa, Kari

    2013-01-01

    Opinnäytetyön tavoitteena on esitellä IPv6-protokolla ja selvittää sen tärkeimmät tietoturvaominaisuudet ja -riskit. Työtä tullaan käyttämään teoreettisena apuna Turun Ammattikorkeakoulun Lemminkäisenkadun toimipisteen laboratorioverkon siirtämisessä IPv6:een. Opinnäytetyö on jaettu kolmeen osaan. Ensimmäisessä esitellään lyhyesti IPv6:n historia ja kehitysvaiheet sekä uuden protokollan ominaisuudet. Toinen osa koostuu ominaisuus- ja tietoturvavertailusta IPv4:n ja IPv6:n välillä, jo...

  18. Planning for IPv6

    CERN Document Server

    Hagen, Silvia

    2011-01-01

    It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical-and nontechnical-steps involved. Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company. IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she co

  19. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  20. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  1. Intimate partner violence (IPV)

    DEFF Research Database (Denmark)

    Rasch, Vibeke; Van, Toan Ngo; Nguyen, Hanh Thi Thuy

    2018-01-01

    BACKGROUND: Intimate partner violence (IPV) is a global problem that affects one-third of all women. The present study aims to develop and determine the validity of a screening instrument for the detection of IPV in pregnant women in Tanzania and Vietnam and to determine the minimum number...

  2. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  3. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  4. Intimate partner violence: IPV in the LGBT community.

    Science.gov (United States)

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Nationally, the rates of intimate partner violence (IPV) among lesbian, gay, bisexual, or transgender (LGBT) individuals are similar to or greater than rates for heterosexuals. Many have experienced psychological and physical abuse as sexual minorities, making it difficult for them to seek help for IPV. Physician behavior, such as not assuming that all patients are heterosexual, being nonjudgmental, and using inclusive language, can empower LGBT patients to disclose IPV. Also, physicians should ascertain the degree to which the patient is out. The threat of being outed can be an aspect of the power and control exerted by an abusive partner and a significant barrier to seeking help. Physicians should screen for IPV and intervene in a similar manner with LGBT and non-LGBT patients, but they should be aware of potential limitations in resources for LGBT patients, such as shelters. As sexual minorities experiencing IPV, LGBT individuals are at greater risk of depression and substance abuse than are non-LGBT individuals. Minority stress, resulting from stigmatization and discrimination, can be exacerbated by IPV. Physicians should learn about legal issues for LGBT individuals and the availability of community or advocacy programs for LGBT perpetrators or victims of IPV. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  5. IPv6-specific misconfigurations in the DNS

    NARCIS (Netherlands)

    Hendriks, Luuk; de Boer, Pieter-Tjerk; Pras, Aiko

    2017-01-01

    With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection

  6. IPv6 in ESnet

    International Nuclear Information System (INIS)

    Matthews, W.; Fink, B.; Hicks, S.; Grigaliunas, V.

    2001-01-01

    The importance of the Internet to modern High Energy Physics collaborators is clearly immense, and understanding how new developments in network technology impact networks is critical to the future design of experiments. The next generation Internet Protocol (IPv6) is being deployed on testbeds and production networks throughout the world. The protocol has been designed to solve todays internet problems, and many of the features will be core Internet services in the future. In this talk the features of the protocol will be described. Details will be given on the deployment at sites important to High Energy Physics Research and the network services operating at these sites. In particular IPv6 deployment on the U.S. Energy Sciences Network (ESnet) will be reviewed. The connectivity and performance between High Energy Physics Laboratories, Universities and Institutes will be discussed

  7. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  8. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  9. Comparison Between IPv4 to IPv6 Transition Techniques

    OpenAIRE

    Cordeiro, Edwin; Carnier, Rodrigo; Zucchi, Wagner L

    2016-01-01

    The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This work makes an experimental comparison of techniques that use dual stack with a limited IPv4 address. This limited address might be a RFC 1918 address with a NAT at the Internet Service Provider (ISP) gateway, also known as Carrier Grade NAT (CG...

  10. Common Crime and Domestic Violence Victimization of Older Chinese in Urban China: The Prevalence and Its Impact on Mental Health and Constrained Behavior.

    Science.gov (United States)

    Qin, Nan; Yan, Elsie

    2018-03-01

    This article examines the prevalence of victimization among older Chinese living in urban China and its psychological and behavioral impacts. A representative sample of 453 older adults aged 60 or above was recruited from Kunming, the People's Republic of China, using multistage sampling method. Participants were individually interviewed on their demographic characteristics, experience of common crime and domestic violence victimization, fear of common crime and domestic violence, mental health, and constrained behavior. Results showed that 254 participants (56.1%) reported one or more types of common crime and 21 (4.6%) reported experiencing domestic violence in the past. Seventeen participants (3.8%) reportedly experienced both common crime and domestic violence victimization. There was no gender difference in the overall incidence of victimization but in some subtypes. Regression analyses indicated that past experience of common crime victimization was significantly associated with greater fear of common crime (β = .136, p = .004), poorer mental health (β = .136, p = .003), and more constrained behavior (β = .108, p = .025). Fear of common crime predicted increased constrained behavior (β = .240, p < .001) independent of gender, age, education, household finances, living arrangement, and physical health. Domestic violence victimization was not significant in predicting poor mental health and constrained behavior but was significant in predicting fear of domestic violence (β = .266, p < .001), which was related to poorer mental health (β = .102, p = .039). The study suggests the importance of taking older people's risk and experience of victimization into consideration in gerontological research, practice, and policymaking.

  11. IPv6 sobre AT

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo

    2011-12-01

    Full Text Available Providing Quality of Service (QoS from communication networks in a global environment, is now one of the main fields of research, mainly due to the increasing importance of applications such as VoIP, video conferencing, stream video and audio, distance education, among others. This article is presented as a technology for providing uality service, the integration of IPv6 and ATM. The main objective is to present and discuss the main considerations and solutions that exist in the integration of IP trafÞ c in ATM technology.

  12. Migrating Applications to IPv6

    CERN Document Server

    York, Dan

    2011-01-01

    If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. Explore changes you need to make in your application's user interfaceMake sure your application is retrieving corre

  13. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  14. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing IPv...

  15. Current Status of IPv6 Management

    OpenAIRE

    Astic , Isabelle; Festor , Olivier

    2002-01-01

    Nowadays, we are at an important time of the development of the IPv6 (Internet Protocol version 6) network. Until now, this protocol was used only between IPv6 «islands». These islands were connected by IPv4 (Internet Protocol version 4) networks. So the transport of IPv6 packets was made through IPv4 ones, or into MPLS (MultiProtocol Label Switching) tunnels. Now, that real IPv6 native equipment appears, it is possible to create real native IPv6 networks.Because in these networks, IPv4 does ...

  16. Esimerkkiyrityksen IPv6-lähiverkko

    OpenAIRE

    Palkki, Ville

    2013-01-01

    Insinöörityön tavoitteena oli suunnitella ja toteuttaa esimerkkiyrityksen IPv6-lähiverkko. Toisena tavoitteena oli suunnitella esimerkkiyrityksen siirtyminen IPv4-protokollasta IPv6-protokollaan. Työssä käsiteltiin IPv6-protokollaa ensin teoreettisesti ja tämän jälkeen suunniteltiin sekä rakennettiin toimiva IPv6-lähiverkko. Aluksi työssä käytiin läpi IPv6-protokollan etuja verrattuna vanhaan IPv4-protokollaan. Teoriaosuudessa selvitettiin myös IPv6-protokollan rakennetta ja lähetysformaa...

  17. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  18. Emergency Department Presentations for Injuries in Older Adults Independently Known to be Victims of Elder Abuse.

    Science.gov (United States)

    Rosen, Tony; Bloemen, Elizabeth M; LoFaso, Veronica M; Clark, Sunday; Flomenbaum, Neal E; Lachs, Mark S

    2016-03-01

    Elder abuse is under-recognized by emergency department (ED) providers, largely due to challenges distinguishing between abuse and accidental trauma. To describe patterns and circumstances surrounding elder abuse-related and potentially abuse-related injuries in ED patients independently known to be physical elder abuse victims. ED utilization of community-dwelling victims of physical elder abuse in New Haven, CT from 1981-1994 was analyzed previously. Cases were identified using Elderly Protective Services data matched to ED records. Sixty-six ED visits were judged to have high probability of being related to elder abuse and 244 were of indeterminate probability. We re-examined these visits to assess whether they occurred due to injury. We identified and analyzed in detail 31 injury-associated ED visits from 26 patients with high probability of being related to elder abuse and 108 visits from 57 patients with intermediate probability and accidental injury. Abuse-related injuries were most common on upper extremities (45% of visits) and lower extremities (32%), with injuries on head or neck noted in 13 visits (42%). Bruising was observed in 39% of visits, most commonly on upper extremities. Forty-two percent of purportedly accidental injuries had suspicious characteristics, with the most common suspicious circumstance being injury occurring more than 1 day prior to presentation, and the most common suspicious injury pattern being maxillofacial injuries. Victims of physical elder abuse commonly have injuries on the upper extremities, head, and neck. Suspicious circumstances and injury patterns may be identified and are commonly present when victims of physical elder abuse present with purportedly accidental injuries. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Trajectories of Intimate Partner Violence Victimization

    Directory of Open Access Journals (Sweden)

    Kevin M. Swartout

    2012-08-01

    Full Text Available Introduction: The purposes of this study were to assess the extent to which latent trajectories of female intimate partner violence (IPV victimization exist; and, if so, use negative childhood experiences to predict trajectory membership.Methods: We collected data from 1,575 women at 5 time-points regarding experiences during adolescence and their 4 years of college. We used latent class growth analysis to fit a series of personcentered, longitudinal models ranging from 1 to 5 trajectories. Once the best-fitting model was selected, we used negative childhood experience variables—sexual abuse, physical abuse, and witnessing domestic violence—to predict most-likely trajectory membership via multinomial logistic regression.Results: A 5-trajectory model best fit the data both statistically and in terms of interpretability. The trajectories across time were interpreted as low or no IPV, low to moderate IPV, moderate to low IPV, high to moderate IPV, and high and increasing IPV, respectively. Negative childhood experiences differentiated trajectory membership, somewhat, with childhood sexual abuse as a consistent predictor of membership in elevated IPV trajectories.Conclusion: Our analyses show how IPV risk changes over time and in different ways. These differential patterns of IPV suggest the need for prevention strategies tailored for women that consider victimization experiences in childhood and early adulthood. [West J Emerg Med. 2012;13(3:272–277.

  20. Sexual victimization and family violence among urban African American adolescent women: do violence cluster profiles predict partner violence victimization and sex trade exposure?

    Science.gov (United States)

    Kennedy, Angie C; Bybee, Deborah; Kulkarni, Shanti J; Archer, Gretchen

    2012-11-01

    Guided by an intersectional feminist perspective, we examined sexual victimization, witnessing intimate partner violence (IPV) in the family, and familial physical abuse among a sample of 180 urban African American adolescent women. We used cluster analysis to better understand the profiles of cumulative victimization, and the relationships between profiles and IPV victimization and personal exposure to the sex trade. Just under one third of the sample reported sexual victimization, with cooccurrence with both forms of family violence common. The cluster profile with high levels of severe family violence was associated with the highest rate of IPV victimization and sex trade exposure.

  1. Average cost per person victimized by an intimate partner of the opposite gender: a comparison of men and women.

    Science.gov (United States)

    Arias, Ileana; Corso, Phaedra

    2005-08-01

    Differences in prevalence, injury, and utilization of services between female and male victims of intimate partner violence (IPV) have been noted. However, there are no studies indicating approximate costs of men's IPV victimization. This study explored gender differences in service utilization for physical IPV injuries and average cost per person victimized by an intimate partner of the opposite gender. Significantly more women than men reported physical IPV victimization and related injuries. A greater proportion of women than men reported seeking mental health services and reported more visits on average in response to physical IPV victimization. Women were more likely than men to report using emergency department, inpatient hospital, and physician services, and were more likely than men to take time off from work and from childcare or household duties because of their injuries. The total average per person cost for women experiencing at least one physical IPV victimization was more than twice the average per person cost for men.

  2. IPv6 geolokace a vizualizace

    OpenAIRE

    Suchomel, Tomáš

    2011-01-01

    Tato diplomová práce se zabývá problematikou geolokace IPv6 adres a vizualizace jejich lokalit. Má za úkol prozkoumat oblast IPv6, dále porovnává současné přístupy ke geolokaci. Jejím hlavním cílem je vybudovat systém, který dokáže vytvořit geolokační databázi s pravidelnou aktualizací a který bude schopen zobrazit geografickou lokalitu IPv6 adresy na světové mapě. Geolokační systém nejprve získá geografické adresy pro jednotlivé prefixy IPv6 z veřejně přístupného systému Whois. Tyto adresy t...

  3. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-11-01

    Full Text Available This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns when...

  4. DNS and BIND on IPv6

    CERN Document Server

    Liu, Cricket

    2011-01-01

    If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6-Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.a

  5. Evaluating IPv6 Adoption in the Internet

    Science.gov (United States)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  6. Assisting older victims of disasters: roles and responsibilities for social workers.

    Science.gov (United States)

    Torgusen, Barbra L; Kosberg, Jordan I

    2006-01-01

    The tumultuous catastrophic tragedies of the Oklahoma bombing in 1995 and September 11, 2001 attacks on the World Trade Center and Pentagon have caused urgency for the profession of social work to be ready to respond to unexpected crises whether directed to an individual, group, or nation. While there has always been the possibility of tragedies in the U.S. caused by nature (so-called "acts of God") or the spontaneous or planned acts of criminals or the deranged, the increased awareness of catastrophes includes, as never before, disasters that are perpetrated by terrorist acts from within or outside of the U.S. The creation of the Department of Homeland Security, in 2003, underscores the need for awareness and for preparation on the part of the nation. Based upon its skills and values, social workers have significant roles to play in the face of potential and actual disasters; yet, gerontological social workers have additional responsibilities for addressing the needs of older persons. It is the purpose of this article to provide an overview of issues to be considered by social workers, in general, and gerontological social workers, in particular, with regard to preparation for possible disasters and the consequences from such catastrophes that affect older persons.

  7. Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6

    Directory of Open Access Journals (Sweden)

    PAULINE RAHMIATI

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan dibandingkan 2 buah jaringan berbasis routing protokol OSPF, yaitu OSPF untuk IPv4 dan IPv6. Skenario pertama dilakukan 100 kali dalam 5 kasus untuk mengetahui nilai delay OSPF IPv4 dan OSPF IPv6. Skenario kedua dilakukan pemutusan link dilakukan sebanyak 30 kali, hal yang dilihat dari pengujian ini adalah hasil trace route dari cost yang ada. Skenario ketiga dilakukan dengan mengamati waktu konvergensi dari OSPF IPv4 dan IPv6. Secara keseluruhan nilai delay OSPF IPv6 lebih kecil dibandingkan dengan OSPF IPv4 sebesar 3-6%, Trace route dan nilai cost pada OSPF IPv6 dan OSPF IPv4 sama tetapi nilai delay OSPF IPv6 lebih kecil sebesar 3-6% dan waktu konvergensi OSPF IPv4 bernilai sama dengan OSPF IPv6 yaitu 10 detik. Kata kunci: OSPF, IPv4, Ipv6, delay, konvergensi Abstract OSPF (Open Shortest Path First is a routing protocol that opened and supported by a wide range of network devices. IPv4 has reached the maximum limit on the number of addresses that IPv6 are a solution in this case. Same as IPv4, IPv6 also has begun to be implemented for the OSPF routing protocol, therefore this study wiould design an IPv6 OSPF routing protocol and as a comparison will be compared to IPv4 OSPF. Cisco Packet Tracer 5.3 software was used to simulate the made network design. This research would compare two pieces of network-based routing protocol OSPF, OSPF for IPv4 and IPv6. The

  8. Caracterización de IPv6

    Directory of Open Access Journals (Sweden)

    Carlos A. Castillo Medina

    2013-05-01

    Full Text Available The present paper attempts to survey the current state of the network protocol called IPv6; starting from the evolution of IPv4 (which motivated the design of new features to the details that are comprised in the new version of the Internet Protocol. The main sections explain the drawbacks of IPv4 that can be overcome by implementing IPv6, highlighting aspects such as security, mobility, and Quality of Service (QoS.

  9. CORPORATE MIGRATION FROM IPv4 TO IPv6 USING DIFFERENT TRANSITION MECHANISMS

    OpenAIRE

    Nellore Karthikeyan*, K.Chandra Mouli

    2016-01-01

    Currently, the Internet world is confronting the huge issue that is exhaustion of IP addresses with the IPv4 protocol. This paper contains the imperative hypothetical ideas of new era Internet Protocol IPv6 which tackles the issue of IP tending to furthermore concentrate on IPv6 address design, directing and three mechanisms of migration from IPv4 to IPv6 system: Dual Stack, Translation and Tunneling utilizing Network Simulator as Packet tracer. This paper more accentuation on network migrati...

  10. IPv6 Geolocation Using Latency Constraints

    Science.gov (United States)

    2014-03-01

    ground truth datasets. In doing so, we investigate the following: • What is the accuracy of CBG when geolocating IPv6 hosts? • What are the accuracy...the overall PL is shorter for IPv6 than IPv4 which is consistent to what was found in recent work discussed in Section 3.5. Note that the average PL...growth of IPv6 addresses has increased significantly since 2010.The rate of increase of IPv6 usage is expected to continue; thus the need to determine

  11. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  12. When the Cop Is the Victim: A Test of Target Congruence Theory on Intimate Partner Violence Victimization Experienced by Police Officers.

    Science.gov (United States)

    Zavala, Egbert

    2017-05-01

    This study analyzed data from the Police Stress and Domestic Violence in Police Families in Baltimore, Maryland, 1997-1999 ( N = 753) to examine propositions derived from target congruence theory in the context of intimate partner violence (IPV) victimization experienced by police officers. Specifically, this study tested the influence of target vulnerability, target gratifiability, and target antagonism on IPV victimization. Results from logistic regression models showed that all three theoretical constructs positively and significantly predicted IPV victimization. Results, as well as the study's limitations and directions for future research, are discussed.

  13. The Relationship Between Family, Parent, and Child Characteristics and Intimate-Partner Violence (IPV) Among Ukrainian Mothers.

    Science.gov (United States)

    Burlaka, Viktor; Grogan-Kaylor, Andrew; Savchuk, Olena; Graham-Bermann, Sandra A

    2017-07-01

    To assess the prevalence of intimate partner violence (IPV) in a sample of Ukrainian mothers of schoolchildren, and to examine the relationship between IPV and family, parent, and child characteristics utilizing multilevel models. Mothers of children aged 9-16 (n = 278, 93.5% Ukrainians) answered the Revised Conflict Tactics Scale (CTS2) assessing IPV. We also examined the relationship between IPV and maternal age, education, employment and marital status, family income, and rural or urban residence. Eighty-one percent of women reported psychological violence and 58% reported physical assault. On average, women reported 66 instances of IPV during the last year. Multilevel modeling revealed that lower maternal education, unemployment, not living with the husband or partner, and urban residency were associated with higher IPV victimization. Younger age and family income were not significantly related to IPV. IPV was a significant social problem in the present sample of Ukrainian mothers of school age children. Future policy and violence prevention programming should focus on supporting academic and employment opportunities for women, particularly for those living in urban areas.

  14. Siirtyminen IPv6-protokollaan yrityksen verkkolaitteistossa

    OpenAIRE

    Lindén, Kalle

    2012-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, mitä muutoksia Päijät-Hämeen koulutuskonsernin (PHKK) tietoverkon runkolaitteissa tarvitsee tehdä, jotta voidaan ottaa IPv6-protokolla käyttöön. Siirtyminen IPv6-protokollaan tulee olemaan välttämätön toimenpide, koska IPv4-protokollasta loppuvat uudet yksilölliset osoitteet. IPv4- ja IPv6-protokollien suurimmat erot ovat osoitekentän koon kasvaminen 32 bitistä 128 bittiin. Aluksi IPv4-osoitteistuksessa oli käytössä luokallinen osoitejärjest...

  15. Dynamics of Abusive IPv6 Networks

    Science.gov (United States)

    2014-09-01

    39 List of References 43 Initial Distribution List 47 vii THIS PAGE INTENTIONALLY LEFT BLANK viii List of Figures Figure 1.1 Google User IPv6 Adoption...2 Figure 1.1: Google User IPv6 Adoption Statistics, from June 2014 [3] For example, as a result of expanding use of IPv6, it is hypothesized that a...excessive annoyance of poorly crafted advertising emails, they can sometimes contain attachments or links to scam offers, phishing attempts, or malicious

  16. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  17. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  18. Economic Insecurity and Intimate Partner and Sexual Violence Victimization.

    Science.gov (United States)

    Breiding, Matthew J; Basile, Kathleen C; Klevens, Joanne; Smith, Sharon G

    2017-10-01

    Previous research has consistently found that low SES is associated with higher levels of both intimate partner violence (IPV) and sexual violence (SV) victimization. Though associated with poverty, two indicators of economic insecurity, food and housing insecurity, have been identified as conceptually distinct social determinants of health. This study examined the relationship between food and housing insecurity experienced in the preceding 12 months and IPV and SV victimization experienced in the preceding 12 months, after controlling for SES and other demographic variables. Data were from the 2010 National Intimate Partner and Sexual Violence Survey, a nationally representative telephone survey of U.S. adults. In 2016, multivariate logistic regression modeling was used to examine the association between food and housing insecurity and multiple forms of IPV and SV victimization. Robust associations were found between food and housing insecurity experienced in the preceding 12 months and IPV and SV experienced in the preceding 12 months, for women and men, even after controlling for age, family income, race/ethnicity, education, and marital status. Food and housing insecurity may be important considerations for the prevention of SV and IPV or the reductions of their consequences, although future research is needed to disentangle the direction of the association. Strategies aimed at buffering economic insecurity may reduce vulnerability to IPV and SV victimization. Copyright © 2017. Published by Elsevier Inc.

  19. IPv6 Monitoring in Nederland : De Nulmeting

    NARCIS (Netherlands)

    Boen-Leo, M.; Holtzer, A.; Tijmes, M.R.; Smets, R.

    2010-01-01

    In dit document wordt de mate van uitrol van IPv6 in Nederland per april 2010 beschreven. De 'nulmeting' is uitgevoerd in opdracht van het Ministerie van Ecnomische Zaken en is de eerste van twee metingen die in 2010 worden uitgevoerd. Allereerst wordt een korte uitleg gegeven over IPv6 en het

  20. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  1. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  2. Implementation of IPv6 at the PřF JU

    OpenAIRE

    JOUDAL, Jakub

    2011-01-01

    Aspects of IPv6 implementation. Is the current network structure capable of deploying IPv6 JU? What would this change mean? What will be the financial costs of transition? The advantages of IPv6 in terms of high schools.

  3. Accounting for Intimate Partner Violence: A Biographical Analysis of Narrative Strategies Used by Men Experiencing IPV From Their Female Partners.

    Science.gov (United States)

    Corbally, Melissa

    2015-10-01

    Intimate partner violence (IPV) is a serious social issue which affects the medium- and long-term health outcomes of many individuals worldwide. The cost of IPV on the physical and psychological well-being of individuals, in addition to its wider economic costs in responding to abused persons, is significant. Presently, there is a lack of understanding about the nature of female-initiated IPV and how men account for their experiences of it. This study examined male victims' life stories of their IPV experiences from their intimate partners. Using the biographical narrative interpretive method, three cases were analyzed from a social constructionist perspective to examine what narrative strategies men used to account for their experiences of being abused by their female partners. Three dominant narrative strategies were used by respondents: the fatherhood narrative, the good husband narrative, and the abuse narrative. The abuse narrative had a unique narrative form, which reflected respondents' disassociation between their identities as men and also as abused persons. Dominant conflicting discourses of masculinity and intimate partner abuse disadvantaged men in identifying IPV and secondly in responding appropriately. This study found that men prefer to use dominant discursive identities as legitimate means from which to disclose IPV experiences. The findings from this study illustrate that broad questioning by professionals regarding fatherhood may be most helpful in promoting disclosures of IPV if this is suspected. © The Author(s) 2014.

  4. Intimate partner violence perpetrators in a forensic psychiatric outpatient setting: criminal history, psychopathology, and victimization.

    Science.gov (United States)

    Henrichs, Jens; Bogaerts, Stefan; Sijtsema, Jelle; Klerx-van Mierlo, Fanny

    2015-07-01

    This study investigated criminological, psychopathological, and victimological profiles of intimate partner violence (IPV) perpetrators in a sample of 119 Dutch female and male forensic psychiatric outpatients aged 18 to 58 years. In addition, differences in criminological, psychopathological, and victimological factors between IPV perpetrators (n = 61, 51.3%) and non-intimate violence (NIV) perpetrators (n = 58, 48.7%) were examined. All data, including information on demographics, criminal history, history of psychological, sexual, and physical victimization during childhood or adolescence, family history of psychopathology, history of psychopathology in childhood and adolescence, and mental disorders, were derived from archival electronic medical records. Mental disorders were measured using structured psychiatric interviews and final consensus diagnoses were established during weekly case consultations. Both IPV and NIV perpetrators displayed high rates of criminal history, psychopathology, and previous victimization, but the two groups did not differ in these factors with two exceptions. IPV perpetrators were significantly more likely to have higher rates of previous physical victimization and intermittent explosive disorder than NIV perpetrators. The current study suggests that a history of physical victimization and intermittent explosive disorder are specific characteristics of IPV perpetrators in a forensic psychiatric outpatient setting. Future research should focus on mechanisms explaining the association of childhood victimization and IPV and increase our understanding of the role of intermittent explosive disorder in IPV. © The Author(s) 2014.

  5. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  6. IPv4 to IPv6 Transition: Optimal Routing Protocol within Dual Stack and Tunneling

    OpenAIRE

    Aparna Sivaprakash; S. Kayalvizhi

    2016-01-01

    The number of global internet users has been growing exponentially, necessitating a much larger number of unique IP addresses for all the connected networking devices. The prevalent IP version 4 is not able to meet the current requirement for IP addresses. To meet the future IP address requirement, a new version IPv6 has been introduced since 1999. However IPv6 is not backward compatible with IPv4.since it is not possible to migrate all the networking devices to ...

  7. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  8. Happy World IPv6 Day!

    CERN Multimedia

    Adrian Giordani (iSGTW)

    2011-01-01

    Almost 20 years after Tim Berners-Lee posted a summary of his World Wide Web project on the newsgroup, there are more than two billion users worldwide, and billions more web pages. It has transformed the way we socialize, conduct business, and even changed the way we do science. But unfortunately, the number of available Internet addresses has not grown at the same place to accommodate these changes.   The number of Internet addresses is fixed because of the way the Internet operates: data is routed through the Internet in packets that use numeric addresses to encode its origin and its destination. The layer of communication at this level is called Internet Protocol (IP), originally developed by Vint Cerf, a program manager at the US Department of Defense Advanced Research Projects Agency and now Vice President and Chief Internet Evangelist of Google, USA, and member of numerous boards including as Commissioner for the Broadband Commission for Digital Development in 2010. IPv4 addresses, w...

  9. Tcam от IPv4 к IPv6

    OpenAIRE

    Багинян, А.; Долбилов, А.

    2013-01-01

    Статья посвящена проблемам современной маршрутизации сети Интернет. Рассматриваются проблемы выборки маршрутов сетей, использования политик безопасности и качества обслуживания передаваемой информации. Отдельный раздел посвящен примерам использования свойств маски сетей для сокращения размеров таблиц маршрутизации. Рассмотрены различные возможные варианты компоновки адресной памяти, проведено сравнение между маршрутизацией по протоколу Ipv4 и Ipv6, а так же рассмотрены варианты программных и ...

  10. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  11. Design and implementation of scalable IPv4-IPv6 internetworking gateway

    Science.gov (United States)

    Zhu, Guo-sheng; Yu, Shao-hua; Dai, Jin-you

    2008-11-01

    This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to modify the data forwarding plane.A SIP ALG of 3GPP IMS(IP Multimedia Subsystem)was implemented and tested under real China Next Generation Internet(CNGI) network environment.IPv4 SIP UEs can communicate with IPv6 SIP UEs through the gateway.

  12. A Literature Survey on Handoff for Mobile IPv6

    OpenAIRE

    Zongpu Jia; Gaolei Wang; Ran Zhao

    2011-01-01

    With the development of network technology, IPv6 will be widely used in the next generation Internet, IPv6 will be used in the next generation Internet, IPv6 could combine mobile networks and fixed wireless networks closely, which brings great convenience to people’s live. The handoff delay of Mobile IPv6 seriously affected the real-time communication service quality, therefore various improvement methods based on the basic Mobile IPv6 protocol are proposed. The working principle of Mob...

  13. WLCG and IPv6 - the HEPiX IPv6 working group

    Science.gov (United States)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  14. WLCG and IPv6 – the HEPiX IPv6 working group

    International Nuclear Information System (INIS)

    Campana, S; Elwell, A; Goossens, L; Grigoras, C; Martelli, E; Nairz, A; Pfeiffer, A; Chadwick, K; Chen, G; Chudoba, J; Eliáš, M; Kouba, T; Clarke, P; Fayer, S; Finnern, T; Ohrenberg, K; Hoeft, B; Kelsey, D P; Muñoz, F López; Mitchell, M

    2014-01-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  15. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    Science.gov (United States)

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  16. PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gelvez García

    2013-09-01

    Full Text Available Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4 [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.

  17. Mutual Partner Violence: Mental Health Symptoms among Female and Male Victims in Four Racial/Ethnic Groups

    Science.gov (United States)

    Prospero, Moises; Kim, Miseong

    2009-01-01

    This study examines racial/ethnic and sex differences in the prevalence of mutual intimate partner violence (IPV) and mental health symptoms. The authors asked 676 university students in heterosexual relationships if they had experienced IPV, coercive victimization, and/or perpetration as well as symptoms of depression, anxiety, hostility, and…

  18. Subjective Sleep Quality in Women With Divorce Histories: The Role of Intimate Partner Victimization.

    Science.gov (United States)

    Newton, Tamara L; Burns, Vicki Ellison; Miller, James J; Fernandez-Botran, G Rafael

    2016-05-01

    A marital status of divorced or separated, as opposed to married, predicts increased risk of health problems, but not for all persons. Focusing on one established health risk that has been linked with divorce--poor subjective sleep quality--the present cross-sectional study examined whether a history of physical intimate partner victimization (IPV) helps identify divorced women at potentially greater risk of health problems. Community midlife women with divorce histories, all of whom were free of current IPV, reported on their past month sleep quality and lifetime IPV. The predicted odds of poor sleep quality were significantly greater for women with, versus without, IPV histories. This held after adjusting for socioemotional, medical, or sociodemographic risks. A dose-response relationship between IPV chronicity and poor quality sleep was observed. IPV history may help identify divorced women at increased risk of poor quality sleep and, more broadly, poor health. © The Author(s) 2015.

  19. Application of IPv6 in GIS

    Science.gov (United States)

    Wang, Zhen-feng; Wang, Liang

    2008-10-01

    The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.

  20. ERADIKASI POLIO DAN IPV (INACTIVATED POLIO VACCINE

    Directory of Open Access Journals (Sweden)

    Gendrowahyuhono Gendrowahyuhono

    2012-09-01

    Full Text Available In the year 1988, World Health Organization (WHO claims that polio viruses should be eradicated after year 2000. However, until year 2010 the world have not been free from polio viruses circulation. So many effort had been achieved and it is estimated that the world will be free from polio virus after the year 2013. Control of poliomyelitis in Indonesia has been commenced since 1982 with routine immunization of polio program and the National Immunization Days (NID has been commenced since 1995,1996,2005 and 2006. When the world is free from polio virus, WHO suggests several alternative effort to maintain the world free from polio viruses : I stop the OPV (Oral Polio Vaccine and no polio immunization, 2 stop OPV and stock pile mOPV (monovalent OPV, 3 use OPV and IPV (Inactivated Polio Vaccine in a certain times, 4 use IPV only in a certain times. IPV has been used routinely in develop countries but has not been used in the developing countries. Several studies in development countries has been conducted, but had not been done in the developing countries. Indonesia collaboration with WHO has conducted the study of IPV in Yogyakarta Province since year 2002 until year 2010. The overall aim of the study is to compile the necessary data that will inform global and national decision-making regarding future polio immunization policies for the OPV cessation era. The data generated from the study will be particularly important to make decisions regarding optimal IPV use in developing tropical countries. It is unlikely that this data can be assembled through other means than through this study. The tentative result of the study shows that OPV immunization coverage in the year 2004 is 99% in four district and 93 % in the Yogyakarta city. Environment surveillance shows that there are 65.7% polio virus detected from 137 sewage samples pre IPV swich, and 4.8% polio virus detected from 83 sewage samples post IPV swich. Survey polio antibody serologis shows

  1. Initial results from an IPv6 Darknet

    OpenAIRE

    Ronan, John; Ford, Matthew; Stevens, Jonathan

    2006-01-01

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background ‘noise’ on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration. We have created what may be the world’s first IPv6 darknet to help us observe the ‘n...

  2. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...... enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...

  3. Investigating the Performance of the MPT Multipath Communication Library in IPv4 and IPv6

    Directory of Open Access Journals (Sweden)

    Béla Almási

    2016-01-01

    Full Text Available The currently used mobile devices (laptops, tablets, mobile phones contain many built-in network cards for communication (e.g. Wi-Fi, 3G, Bluetooth, etc.. A natural request could be combining the resources of the different network connection possibilities in order to increase the throughput of the communication. Unfortunately the standard IP communication technology does not support it: the communication is restricted to one IP address (i.e. to one interface. The Multipath TCP (MPTCP specification (appeared in January 2013 offers a Transport layer solution of using more than one interface in a TCP communication session. In this paper we investigate a Network layer solution. The MPT multipath communication library opens the multipath communication possibility in the Network layer. Using the MPT library, applications built on the UDP protocol are also able to perform multipath communication. The MPT library was developed by using a full dual-stack technology, which means the MPT based multipath environment can be used both in IPv4 and IPv6. Protocol version change is also possible: an IPv6 based application is able to run in an IPv4 multipath environment, and an IPv4 application can be used in an IPv6 multipath environment. In this paper we give a short overview on the MPT communication library’s working mechanism and detailed numerical examples will be shown to present how the MPT library aggregates the paths’ throughput in IPv4 and IPv6 environments. The main contribution of the paper is to demonstrate the effective throughput aggregation property of the MPT library in IPv6 and in mixed (i.e. protocol version change environments.

  4. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  5. Intimate partner violence victimization and parenting: A systematic review.

    Science.gov (United States)

    Chiesa, Antonia E; Kallechey, Leigh; Harlaar, Nicole; Rashaan Ford, C; Garrido, Edward F; Betts, William R; Maguire, Sabine

    2018-04-14

    Early studies examining parenting in the setting of intimate partner violence (IPV) often focus on abuse by the IPV perpetrator or effects of long term exposure. This review addresses how intimate partner violence impacts victim parenting. Seven databases were searched for the time period 1970-2015. Included were comparative studies involving children 11 years or younger. Quality ranking was based on: confirmation of victim status, consideration of co-perpetration, heterogeneity of the population, and standardization of measurements. Of 13,038 studies reviewed, 33 included studies showed that victimization is associated with negative parenting practices. Based on data presented within individual studies, 21 studies were eligible for meta-analysis which demonstrated modest effect sizes with high levels of heterogeneity. There was a negative correlation between IPV and positive parenting (r = -0.08; 95% CI: -.12, - .04); positive correlation between IPV and physical aggression (r = .17; 95% CI: .11, .23) and neglect (r = .12; 95% CI: .01, .23); and a trend toward positive correlation between IPV and psychological aggression (r = .23; 95% CI: -.94, .47). A synthesis of studies unsuitable for meta-analysis reinforced these findings. The review demonstrated ongoing methodological issues with extant literature. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. The production deployment of IPv6 on WLCG

    Science.gov (United States)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  7. RIPng- A next Generation Routing Protocal (IPv6) | Falaye | Journal ...

    African Journals Online (AJOL)

    ... Information Protocol Next Generation (RIPng) owing to the current depletion rate of IPv4. ... that support the Internet Protocol Version 6 (IPv6).addressing scheme. ... A brief history is given; its various versions are discussed, and detailed ...

  8. IPV Screening and Readiness to Respond to IPV in Ob-Gyn Settings: A Patient-Physician Study

    Directory of Open Access Journals (Sweden)

    Katherine M. Jones

    2018-01-01

    Full Text Available Purpose. Intimate partner violence (IPV is a serious, preventable public health concern that largely affects women of reproductive age. Obstetrician-gynecologists (ob-gyns have a unique opportunity to identify and support women experiencing IPV to improve women’s health. Considering recent efforts to increase IPV awareness and intervention, the present study aimed to provide a current evaluation of nationally representative samples to assess ob-gyn readiness to respond to IPV as well as patient IPV-related experiences. Methods. 400 ob-gyns were randomly selected from American College of Obstetricians and Gynecologists’ (ACOG Collaborative Ambulatory Research Network. Each physician was mailed one physician survey and 25 patient surveys. Results. IPV training/education and IPV screening practices were associated with most measures of ob-gyn readiness to respond to IPV. Among respondents, 36.8% endorsed screening all patients at annual exams; however, 36.8% felt they did not have sufficient training to assist individuals in addressing IPV. Workplace encouragement of IPV response was associated with training, screening, detection, preparation/knowledge, response practices, and resources. Thirty-one percent of patients indicated their ob-gyn had asked about possible IPV experiences during their medical visit. Conclusion. Findings highlight specific gaps in ob-gyns’ IPV knowledge and response practices to be further addressed by IPV training.

  9. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    addressing, new generation internet. 2. ... required the creation of the next generation of Internet ... IPv6 standards have defined the following Extension headers ..... addresses are represented as x:x:x:x:x:x:x:x, where each x is the hexadecimal ...

  10. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS by Matthew D. Gray September...AND SUBTITLE DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS 5. FUNDING NUMBERS CNS-1111445 6. AUTHOR(S) Matthew D. Gray 7...Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude

  11. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    user1

    gaming, and many other new applications cost even higher to be deployed on IPv4 ... mitigate the effects of the imminent depletion of the IPv4 address space and .... The government of Korea plans to achieve complete IPv6 transition in the.

  12. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it superior to ...

  13. Measuring and Comparing the Stability of Internet Paths over IPv4 & IPv6

    OpenAIRE

    Golkar, Forough

    2014-01-01

    Enormous Internet growth is an obvious trend nowadays while Internet protocol version 4 address space exhaustion led into the invention of Internet protocol version 6 and subsequently raised the transitioning challenges from one protocol to the other one. As the Internet protocol version 6 have not been around for a long time, thus there is a limitation knowledge in topology, routing change and performance of IPv6. Several studies are going on in order to getting the information about IPv6 wh...

  14. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  15. Modelo para la integración de redes IPv4 – IPv6 basado en túneles

    Directory of Open Access Journals (Sweden)

    Danilo López

    2010-12-01

    Full Text Available The intention of this paper is to set up a general model in order to interconnect heterogeneous nets IPv4-IPv6, guarantying the integrity of the data, making use of transition techniques.

  16. From IPv4 to eternity - the HEPiX IPv6 working group

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    The much-heralded exhaustion of the IPv4 networking address space has finally started. While many of the research and education networks have been ready and poised for years to carry IPv6 traffic, there is a well-known lack of academic institutes using the new protocols. One reason for this is an obvious absence of pressure due to the extensive use of NAT or that most currently still have sufficient IPv4 addresses. More importantly though, the fact is that moving your distributed applications to IPv6 involves much more than the routing, naming and addressing solutions provided by your campus and national networks. Application communities need to perform a full analysis of their applications, middleware and tools to confirm how much development work is required to use IPv6 and to plan a smooth transition. A new working group of HEPiX (http://www.hepix.org) was formed in Spring 2011 to address exactly these issues for the High Energy Physics community. The HEPiX IPv6 Working Group has been investigating the ma...

  17. An IPv6 Multihomed Host for Outbound Traffic

    Science.gov (United States)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  18. Rural Australian Women's Legal Help Seeking for Intimate Partner Violence: Women Intimate Partner Violence Victim Survivors' Perceptions of Criminal Justice Support Services

    Science.gov (United States)

    Ragusa, Angela T.

    2013-01-01

    Intimate partner violence (IPV) is a widespread, ongoing, and complex global social problem, whose victims continue to be largely women. Women often prefer to rely on friends and family for IPV help, yet when informal support is unavailable they remain hesitant to contact formal services, particularly legal support for many reasons. This study…

  19. IPV6 Network Infrastructure and Stability Inference

    Science.gov (United States)

    2014-09-01

    the Too Big Trick ( TBT ) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick ( TBT ) to induce the remote targets...SNMP Simple Network Management Protocol TSval Timestamp Value TCP Transmission Control Protocol TBT Too Big Trick USG U.S. government xiv

  20. IPv6 races across the Atlantic

    CERN Multimedia

    2003-01-01

    "...Scientists at the California Institute of Technology and the European Organization for Nuclear Research (CERN) have set a new Internet2 land speed record using IPv6, the next-generation Internet protocol. The team sustained a single stream transmission control protocol (TCP) rate of 983 Mbits/s for more than an hour between CERN's facility in Geneva and Chicago, spanning more than 7000 km" (1/2 page).

  1. Child abuse and neglect and intimate partner violence victimization and perpetration: a prospective investigation.

    Science.gov (United States)

    Widom, Cathy Spatz; Czaja, Sally; Dutton, Mary Ann

    2014-04-01

    This paper describes the extent to which abused and neglected children report intimate partner violence (IPV) victimization and perpetration when followed up into middle adulthood. Using data from a prospective cohort design study, children (ages 0-11) with documented histories of physical and sexual abuse and/or neglect (n=497) were matched with children without such histories (n=395) and assessed in adulthood (Mage=39.5). Prevalence, number, and variety of four types of IPV (psychological abuse, physical violence, sexual violence, and injury) were measured. Over 80% of both groups - childhood abuse and neglect (CAN) and controls - reported some form of IPV victimization during the past year (most commonly psychological abuse) and about 75% of both groups reported perpetration of IPV toward their partner. Controlling for age, sex, and race, overall CAN [adjusted odds ratio (AOR)=1.60, 95% CI [1.03, 2.49

  2. HIV Positive Diagnosis During Pregnancy Increases Risk of IPV Postpartum Among Women with No History of IPV in Their Relationship.

    Science.gov (United States)

    Groves, Allison K; Reyes, H Luz McNaughton; Moodley, Dhayendre; Maman, Suzanne

    2017-07-24

    There has been limited study of whether and for whom physical intimate partner violence (IPV) is a consequence of an HIV-positive diagnosis. Per the diathesis stress model, the consequences of HIV infection may be worse for women with a history of IPV. We hypothesize that the positive association between HIV diagnosis in pregnancy and postpartum IPV will be exacerbated for women with a history of IPV. Data come from a prospective cohort study with 1015 participants who completed a baseline antenatal and 9-month postpartum visit. Using logistic regression analyses, we found a statistically significant interaction between HIV diagnosis, history of IPV and postpartum IPV (AOR: 0.40, 95% CI 0.17-0.96). The findings were in the opposite direction as expected: HIV-diagnosis was not associated with IPV for women with a history of IPV (AOR: 2.17, 95% CI 1.06, 4.42). However, HIV-positive women without a history of IPV faced more than two times the risk of incident postpartum IPV than HIV-negative women (AOR: 2.17, 95% CI 1.06, 4.42). Interventions to reduce incident and ongoing IPV during the perinatal period are needed.

  3. Intimate Partner Violence Victimization in LGBT Young Adults: Demographic Differences and Associations with Health Behaviors.

    Science.gov (United States)

    Reuter, Tyson R; Newcomb, Michael E; Whitton, Sarah W; Mustanski, Brian

    2017-01-01

    Intimate partner violence (IPV) is an important public health problem with high prevalence and serious costs. Although literature has largely focused on IPV among heterosexuals, studies have recently begun examining IPV in LGBT samples, with mounting evidence suggesting IPV may be more common among LGBT individuals than heterosexuals. Less research has examined the specific health consequences of IPV in this population, particularly across time and among young people, and it remains unclear whether experiences of IPV differ between subgroups within the LGBT population (e.g. race, gender identity, and sexual orientation). An ethnically diverse sample of 172 LGBT young adults completed self-report measures of IPV, sexual behavior, mental health, and substance abuse at two time points (4- and 5-year follow-up) of an ongoing longitudinal study of LGBT youth. IPV was experienced non-uniformly across demographic groups. Specifically, female, male-to-female transgender, and Black/African-American young adults were at higher risk compared to those who identified as male, female-to-male transgender, and other races. Being a victim of IPV was associated with concurrent sexual risk taking and prospective mental health outcomes but was not associated with substance abuse. Demographic differences in IPV found in heterosexuals were replicated in this LGBT sample, though additional research is needed to clarify why traditional risk factors found in heterosexual young people may not translate to LGBT individuals. Studies examining the impact of IPV on negative outcomes and revictimization over time may guide our understanding of the immediate and delayed consequences of IPV for LGBT young people.

  4. Intimate partner violence victims' acceptance and refusal of on-site counseling in emergency departments: Predictors of help-seeking behavior explored through a 5-year medical chart review.

    Science.gov (United States)

    Choi, Anna Wai-Man; Wong, Janet Yuen-Ha; Lo, Ruby Tsz-Fung; Chan, Pik-Ying; Wong, John Kit-Shing; Lau, Chu-Leung; Kam, Chak-Wah

    2018-03-01

    Healthcare services constitute the first formal support that many intimate partner violence (IPV) victims receive and a link to formal welfare and psychological support. The help-seeking behavior for psychosocial support, e.g., Accident and Emergency Departments (AED) onsite counseling, is key to developing effective support for IPV victims. This study aimed to strengthen the health-welfare support link to aid IPV prevention in AEDs by investigating the acceptance and refusal of on-site counseling by IPV victims. A retrospective cohort study retrieved and reviewed all records of IPV victims presenting at the AEDs of two Hong Kong hospitals between 2010 and 2014. A total of 157 male and 823 female IPV victims were identified, 295 of whom refused on-site counseling. Bivariate and multivariate analyses were performed to examine the association between help-seeking and demographic and violent injury-related factors. The odds of help-seeking via on-site counseling were significantly lower for victims with mental illness (aOR=0.49; 95% CI=0.27, 0.88). After controlling for all demographic characteristics, mental illness, and drug abuse information, sex remained an independent predictor of help-seeking (aOR=2.62; 95% CI=1.45, 4.74); victims who had experienced >2 abuse incidents were more likely to seek help than those who had experienced ≤2 abuse incidents (aOR=1.90; 95% CI=1.11, 3.26). The factors associated with help-seeking from on-site services by IPV victims reflect the need for multidisciplinary collaborative work aimed at IPV prevention. Healthcare professionals require training on how to promote help-seeking behavior targeted specifically for male and female IPV victims according to their needs and preferences. Copyright © 2018 Elsevier Inc. All rights reserved.

  5. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  6. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  7. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  8. The Department of Defense's Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    National Research Council Canada - National Science Library

    Perkins, Kyle L; Scott, Michael A

    2006-01-01

    .... The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM...

  9. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  10. Risk Assessments by Female Victims of Intimate Partner Violence: Predictors of Risk Perceptions and Comparison to an Actuarial Measure

    Science.gov (United States)

    Connor-Smith, Jennifer K.; Henning, Kris; Moore, Stephanie; Holdford, Robert

    2011-01-01

    Recent studies support the validity of both structured risk assessment tools and victim perceptions as predictors of risk for repeat intimate partner violence (IPV). Combining structured risk assessments and victim risk assessments leads to better predictions of repeat violence than either alone, suggesting that the two forms of assessment provide…

  11. The association between child exposure to intimate partner violence (IPV) and perpetration of IPV in adulthood-A systematic review.

    Science.gov (United States)

    Kimber, Melissa; Adham, Sami; Gill, Sana; McTavish, Jill; MacMillan, Harriet L

    2018-02-01

    Increasingly recognized as a distinct form of childhood maltreatment, children's exposure to intimate partner violence (IPV) has been shown to be associated with an array of negative psychosocial outcomes, including elevated risk for additional violence over the life course. Although studies have identified child exposure to IPV as a predictor of IPV perpetration in adulthood, no review has critically evaluated the methodology of this quantitative work. The present study examines the association between childhood exposure to IPV and the perpetration of IPV in adulthood based on a systematic review of the literature from inception to January 4, 2016. Databases searched included Medline, Embase, PsycINFO, CINAHL, Cochrane Database of Systematic Reviews, Sociological Abstracts and ERIC. Database searches were complemented with backward and forward citation chaining. Studies were critically appraised using the Quality Assessment Tool for Observational Cohort and Cross-Sectional Studies. Of 5601 articles identified by the search, 19 studies were included for data extraction. Sixteen of these studies found that child exposure to IPV was significantly and positively associated with adult IPV perpetration; three studies reported null findings. The methodological quality of the studies was low. Work thus far has tended to focus on child exposure to physical IPV and the perpetration of physical IPV within heterosexual contexts. In addition, measures of child exposure to IPV vary in their classification of what exposure entails. We critically discuss the strengths and limitations of the existing evidence and the theoretical frameworks informing this work. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  13. Examining the offender-victim overlap among police officers: the role of social learning and job-related stress.

    Science.gov (United States)

    Zavala, Egbert

    2013-01-01

    This study uses data from the Police Stress and Domestic Violence in Police Families in Baltimore, Maryland 1997-1999 to examine the offender-victim overlap among police officers in the context of intimate partner violence (IPV). Specifically, the study examines the role of parental violence, child maltreatment, and job-related stress on perpetrating violence and victimization. Results from two logistic regression models indicate that one element of job-related stress (negative emotions) was positive and significant in predicting IPV perpetration, whereas parental violence, child maltreatment, and negative emotions were found to be positive and significant in predicting victimization. The study's limitations and future research are discussed.

  14. Deployment of IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  15. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  16. A Brief History of MPLS Usage in IPv6

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2016-01-01

    Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and end-hosts. In parallel, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. However, these studies focus only on IPv4, where MPLS is st...

  17. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Waleed Shahjehan; Dr. Mohammad Haseeb Zafar

    2017-01-01

    One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency is created in Internet Pr...

  18. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Shahjehan , Waleed; Zafar , Mohammad ,; Hussain , Irshad; Farooq , Muhammad

    2017-01-01

    International audience; One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency i...

  19. Symptoms of depression, anxiety, and somatization in female victims and perpetrators of intimate partner violence in Maputo City, Mozambique

    Directory of Open Access Journals (Sweden)

    Soares JJ

    2012-09-01

    Full Text Available Antonio Eugenio Zacarias,1,2 Gloria Macassa,3 Joaquim JF Soares,1 Leif Svanström,1 Diddy Antai1,41Karolinska Institutet, Department of Public Health Sciences, Division of Social Medicine, Stockholm, Sweden; 2Eduardo Mondlane University, Faculty of Medicine, Maputo, Mozambique; 3University of Gävle, Department of Occupational and Health Sciences, Gävle, Sweden; 4Division of Global Health and Inequalities, The Angels Trust – Nigeria, Abuja, NigeriaBackground: Little knowledge exists in Mozambique and sub-Saharan Africa about the mental health (symptoms of depression, anxiety, and somatization of women victims and perpetrators of intimate partner violence (IPV by type of abuse (psychological aggression, physical assault without/with injury, and sexual coercion. This study scrutinizes factors associated with mental health among women victims and perpetrators of IPV over the 12 months prior to the study.Methods and materials: Mental health data were analyzed with bivariate and multiple regression methods for 1442 women aged 15–49 years who contacted Forensic Services at Maputo Central Hospital (Maputo City, Mozambique for IPV victimization between April 1, 2007 and March 31, 2008.Results: In bivariate analyses, victims and perpetrators of IPVs scored higher on symptoms of mental health than their unaffected counterparts. Multiple regressions revealed that controlling behaviors, mental health comorbidity, social support, smoking, childhood abuse, sleep difficulties, age, and lack of education were more important in explaining symptoms of mental health than demographics/socioeconomics or life-style factors. Victimization and perpetration across all types of IPV were not associated with symptoms of mental health.Conclusion: In our sample, victimization and perpetration were not important factors in explaining mental ill health, contrary to previous findings. More research into the relationship between women’s IPV victimization and perpetration

  20. Navigating the gender minefield: An IPV prevention campaign sheds light on the gender gap.

    Science.gov (United States)

    Keller, Sarah N; Honea, Joy C

    2016-01-01

    This article examines how differences in male and female views about intimate partner violence (IPV) contributed to divergent responses to a prevention campaign conducted in the western USA. The study examines focus groups (n = 22) and in-depth interview data (n = 13) collected during campaign development to shed light on quantitative results indicating that women (but not men) increased their perceived severity of domestic violence and awareness of services from pre-test to post-test, while male attitudes moved in the opposite direction. Results of the qualitative study provide the basis for the authors' conclusions about why reactions differed: (1) men's unwillingness to view abuse within a gender context limits men's ability to accept the inequity in statistically demonstrated male and female roles as perpetrators and victims; (2) male resentment of existing gender stereotypes contributed to a rejection of campaign messages that utilised gender prevalence statistics to depict images showing men as perpetrators and women as victims; and (3) victim blaming attitudes contributed to resistance to empathy for victims depicted in the campaign. The authors offer suggestions for future campaigns that foster agency among both perpetrators and survivors while confronting the structural barriers to enacting change.

  1. Nivel de desempeño en redes IPv4 con respecto a redes IPv6 con MPLS y RSVP

    Directory of Open Access Journals (Sweden)

    Alexis Guevara Peña

    2011-06-01

    Full Text Available This paper contains relevant information of the state of art of traffic engineering, MPLS (Multiprotocol Lable Switching and RSVP (Resource Reservation Protocol, as a case study and the techniques used under the new version of IPV6, against IPV4 version. The paper is intended to serve as a framework for the study of Engineering Traffic Based on the new version of IPV6, specifically MPLS and RSVP, takinginto account relevant considerations necessary when making decisions regarding the stability of the Backbone remains the key to Internet service providers that have recently stabilized its IPv4 infrastructure.

  2. Inkubasi Implementasi Ipv6 di Lingkungan PT Telekomunikasi Indonesia Tbk

    Directory of Open Access Journals (Sweden)

    Lunel Candra

    2013-12-01

    ABSTRACT As a network and information service provider in Indonesia, PT Telekomunikasi Indonesia (Telkom is facing a number of problems of exhausted IP addresses, which is also being faced by global telecommunications world. IP addresses widely used todays, i.e. IPv4, have a limitation in terms of number and will be out soon. However, there are some solutions that can be done by telecom operators including implementation of NAT (Network Address Translation 444, dual stack IPv4 and IPv6, tunneling, and native IPv6. Each of the solutions mentioned above have advantages and disadvantages, but the target native IPv6 as main target seems to be the only feasible solution to be addressed by IT industry players, including Telkom. Telkom RDC as the unit mainly focusing in the research of IT technology has been reviewing and testing a lab-scale IPv6 implementation. This also focused on the capabilities incubation for enabling IPv6 on existing telecommunications equipment and interoperability test between the devices. This study provides the result of function, multi-layer integration and interoperability test of IPv6 conducted in Telkom RDC OASIS v6 lab, which also can be considered as references for decision makers within the company to adopt IP technology to be implemented in the future.

  3. The Impact of IPv6 on Penetration Testing

    NARCIS (Netherlands)

    Ottow, Christiaan; van Vliet, Frank; de Boer, Pieter-Tjerk; Pras, Aiko

    In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and

  4. Social support and the intimate partner violence victimization among adults from six European countries.

    Science.gov (United States)

    Dias, Nicole Geovana; Costa, Diogo; Soares, Joaquim; Hatzidimitriadou, Eleni; Ioannidi-Kapolou, Elisabeth; Lindert, Jutta; Sundin, Örjan; Toth, Olga; Barros, Henrique; Fraga, Silvia

    2018-05-21

    Social support may buffer the negative effects of violence on physical and mental health. Family medicine providers play an essential role in identifying the available social support and intervening in intimate partner violence (IPV). This study aimed at assessing the association between social support and the IPV victimization among adults from six European countries. This is a cross-sectional multi-centre study that included individuals from Athens (Greece), Budapest (Hungary), London (UK), Östersund (Sweden), Porto (Portugal) and Stuttgart (Germany). Data collection was carried out between September 2010 and May 2011. The sample consisted of 3496 adults aged 18-64 years randomly selected from the general population in each city. The revised Conflict Tactics Scales was used to assess IPV victimization. Social support was assessed with the Multidimensional Scale of Perceived Social Support. Participants reporting physical assault victimization experienced lower social support (mean ± SD) than their counterparts, 66.1 ± 13.96 versus 71.7 ± 12.90, P social support among participants reporting lifetime and past year victimization, independent of demographic, social and health-related factors. Results showed a statistically significant association between low social support and IPV victimization. Although the specific mechanisms linking social support with experiences of violence need further investigation, it seems that both informal and formal networks may be associated with lower levels of abusive situations.

  5. Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2014-09-01

    Full Text Available The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation is IPv6. Many methods for the implementation of IPv6, one with tunneling. 6to4 is a tunneling method that can be directly implemented on an IPv4 network. This study compared the performance level of a pure IPv4 network, IPv6 6to4 tunneling with pure and searching FTP throughput performance. Throughput results obtained pure IPv6 is smaller than the value of 42.9% pure IPv4 throughput, 6to4 tunneling is smaller than 39.4% pure IPv4 and IPv6 pure value 53.626% greater throughput than 6to4 tunneling configuration.

  6. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  7. IPv6 Test Bed for Testing Aeronautical Applications

    Science.gov (United States)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  8. Social Learning Theory, Gender, and Intimate Partner Violent Victimization: A Structural Equations Approach.

    Science.gov (United States)

    Powers, Ráchael A; Cochran, John K; Maskaly, Jon; Sellers, Christine S

    2017-05-01

    The purpose of this study is to examine the applicability of Akers's Social Learning Theory (SLT) to explain intimate partner violence (IPV) victimization. In doing so, we draw on the Intergenerational Transmission of Violence Theory (IGT) to extend the scope of SLT to the explanation of victimization and for a consideration of uniquely gendered pathways in its causal structure. Using a structural equation modeling approach with self-report data from a sample of college students, the present study tests the extent to which SLT can effectively explain and predict IPV victimization and the degree, if any, to which the social learning model is gender invariant. Although our findings are largely supportive of SLT and, thus, affirm its extension to victimization as well as perpetration, the findings are also somewhat mixed. More significantly, in line with IGT literature, we find that the social learning process is not gender invariant. The implications of the latter are discussed.

  9. Posttraumatic stress, partner violence victimization, and harmful drinking: risk factors for relationship discord in new parents.

    Science.gov (United States)

    Sotskova, Alina; Woodin, Erica M

    2013-11-01

    The first year of parenthood can be a stressful time, especially for high-risk couples. Symptoms of posttraumatic stress (PTS) have been associated with decreased intimacy, communication, and relationship adjustment, yet there is a lack of research on how PTS symptoms might affect couples in early parenthood. Furthermore, there is little evidence regarding the way in which PTS symptoms may affect couples above and beyond known risk factors such as intimate partner violence (IPV) and harmful alcohol use. The current study investigated how PTS symptoms were related to new parents' relationship satisfaction in the context of IPV and harmful drinking. Ninety-eight heterosexual couples filled out questionnaires 1 year after the birth of their first child. Hierarchical multiple regression analyses indicated that, for men, PTS symptoms predicted lower relationship satisfaction over and above IPV victimization and harmful drinking. However, for women, psychological IPV victimization was the only significant multivariate predictor. In addition, for men, PTS symptoms interacted with harmful drinking to predict poorer relationship satisfaction. The results suggest that women's relationship satisfaction is particularly linked to psychological IPV victimization during early parenthood, whereas men's relationship satisfaction is particularly associated with their own harmful drinking and PTS symptoms. Implications are discussed.

  10. Japanese Women’s Perceptions of Intimate Partner Violence (IPV)

    Science.gov (United States)

    Nagae, Miyoko; Dancy, Barbara L.

    2013-01-01

    Intimate partner violence (IPV) is a serious problem in Japan. The purpose of this study was to describe IPV as perceived by Japanese adult females who were in a heterosexual marriage and lived with their spouses at the time of IPV. Using a cross-sectional retroactive qualitative description research design with individual face-to-face in-depth interviews, a purposive sample of 11 Japanese adult females from three urban areas in Japan was interviewed. All women reported that they and their husbands were born in Japan. At the time of the interview, the women had a mean age of 38 years whereas at the time of the IPV, their mean age was 28 years. Data was analyzed using the directed qualitative content analysis method. The results revealed that IPV occurred at the women’s homes primarily at night. All the women reported that they experienced physical and emotional abuse and 82% reported experiencing sexual abuse. Additionally, 64% reported that their parents-in-law emotionally abused them. Communication between these women and their husbands were characterized as unilateral with the husbands initiating and dominating the conversations with orders, lectures, and reprimands. The women identified that the cultural influences of the Japanese patriarchal system that reinforces male superiority and dominance and women inferiority were directly related to IPV. The implication is that health professionals need to actively advocate for effective legislation and policies to address IPV in Japan. PMID:19465572

  11. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  12. Cyberstalking victimization

    Directory of Open Access Journals (Sweden)

    Vilić Vida

    2013-01-01

    Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

  13. Mother's IPV, Child Maltreatment Type and the Presence of PTSD in Children and Adolescents.

    Science.gov (United States)

    Castro, Maravillas; Alcántara-López, Mavi; Martínez, Antonia; Fernández, Visitación; Sánchez-Meca, Julio; López-Soler, Concepción

    2017-09-17

    This correlational cross-sectional study was designed to investigate whether the intimate partner violence (IPV) suffered by mothers (physical and psychological maltreatment), child eyewitness of psychological and physical maltreatment suffered by the mother, the neglect suffered by children, and the maltreatment (physical and psychological) directly suffered by children are statistically associated to post-traumatic stress disorder (PTSD) symptoms exhibited by the child. In addition, the prevalence of child PTSD was estimated, as well as the concordance between the PTSD symptoms assessed by the Child PTSD Symptom Scale (CPSS) and the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR) criteria for child PTSD. The sample consisted of 152 Spanish children aged 8 to 17 and their mothers, who were recruited from Centers of Specialized Assistance for Women Victims of IPV. PTSD prevalence was 20.4%. The results of a canonical correlation analysis showed that the two types of maltreatment with the largest contribution to the canonical variable were physical maltreatment directly suffered by the child, and child eyewitness of physical maltreatment suffered by the mother. The potential developmental pathway of PTSD when both children and mothers suffer severe maltreatment needs to be examined, and this will contribute to the choice of the most effective type of specialized intervention.

  14. Social Norms for Intimate Partner Violence in Situations Involving Victim Infidelity

    Science.gov (United States)

    Witte, Tricia H.; Mulla, Mazheruddin M.

    2012-01-01

    The present study investigated perceived descriptive norms (i.e., perceived prevalence) for male-to-female intimate partner violence (IPV) following victim infidelity (i.e., girlfriend had sex with another man). While watching a video-taped vignette of a young, dating couple in an argument that escalated to male-to-female violence, male…

  15. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  16. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  17. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  18. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  19. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  20. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  1. Kondisi Migrasi Internet Protocol version 6 (IPv6 di Indonesia

    Directory of Open Access Journals (Sweden)

    Fahrizal Lukman Budiono

    2011-06-01

    Full Text Available    Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri. Saat ini, jaringan Internet di Indonesia berikut perangkat-perangkat pendukungnya hingga di tingkat end user masih menggunakan Internet Protocol version 4 (IPv4. Kenyataan yang dihadapi dunia sekarang adalah menipisnya persediaan alamat IPv4 yang dialokasikan. Hal ini dikarenakan jumlah alamat yang dapat didukung oleh IPv4 adalah 232 bits, sedangkan data terakhir didapatkan bahwa alokasi IPv4 telah habis dialokasikan pada akhir April 2011 di tingkat Internet Assigned Numbers Authority (IANA, organisasi yang mengelola sumberdaya protokol Internet dunia. Untuk mempercepat migrasi, stakeholder internet di Indonesia yaitu Kementerian Komunikasi dan Informatika dan Industri Penyelenggara Internet membentuk ID-IPv6TF. Dalam studi ini, ditemukan bahwa implementasi IPv6 di Indonesia termasuk dalam kategori baik dibandingkan dengan negara lain di dunia. Namun, terlihat bahwa perkembangan ini masih sporadis dengan kurangnya peran koordinator, serta sosialiasi ke masyarakat yang tidak ada.

  2. Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2015-03-01

    Full Text Available Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA dan didelegasikan ke melalui otoritas masing-masing benua. IP sendiri terdiri dari 2 jenis versi yaitu IPv4 dan IPv6 dimana alokasi IPv4 dinyatakan habis di tingkat IANA pada bulan April 2011. Oleh karena itu, penggunaan IP diarahkan kepada penggunaan IPv6. Untuk melihat bagaimana kematangan suatu organisasi terhadap implementasi IPv6, penelitian ini mencoba membuat sebuah model tingkat kematangan penerapan IPv6. Konsep dasar dari model ini mengambil konsep Capability Maturity Model Integrated (CMMI, dengan beberapa tambahan yaitu roadmap migrasi IPv6 di Indonesia, Request for Comment (RFC yang terkait dengan IPv6 serta beberapa best-practice implementasi dari IPv6. Dengan konsep tersebut, penelitian ini menghasilkan konsep Capability Maturity for IPv6 Implementation.

  3. Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

    Directory of Open Access Journals (Sweden)

    Elidjen Elidjen

    2010-12-01

    Full Text Available Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4. 

  4. Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-06-01

    Full Text Available Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4 yang memiliki 4 miliar alamat unik. Data dari potaroo.net pada 18 maret 2011, diperkirakan alokasi IPv4 berakhir pada bulan May 2011. Dalam menghadapi keterbatasan IPv4 tersebut, dibuatlah konsep pengalamatan baru IPv6 yang memiliki jumlah alamat 6,5 x 1038 alamat unik. Di Indonesia sendiri dalam rangka mengantisipasi habisnya penggunaan IPv4 tersebut, stakeholder internet di Indonesia yang dikomandoi oleh Kementerian Komunikasi dan Informatika cq. Ditjen Postel membentuk Indonesia IPv6 Task Force (ID-IPv6TF. ID-IPv6TF merumuskan peta jalan / roadmap migrasi ke IPv6 versi 2 yang berakhir pada 2012. Studi ini melakukan evaluasi formatif sejauhmana kesiapan migrasi dari IPv4 ke IPv6 di Indonesia pada tingkat Penyelenggara Jaringan Internet  dengan melihat dari dimensi kesiapan aplikasi, strategi migrasi dan kesiapan infrastruktur. Kesiapan migrasi tersebut dikategorkan menjadi 5 level yaitu IPv6 Agnostic, IPv6 Aware,. Hasil studi menunjukkan bahwa Indonesia berada pada level IPv6 Savvy dengan distribusi level yang beragam.

  5. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering

    Directory of Open Access Journals (Sweden)

    Fuliang Li

    2017-01-01

    Full Text Available Internet Protocol (IP is used to identify and locate computers on the Internet. Currently, IPv4 still routes most Internet traffic. However, with the exhausting of IPv4 addresses, the transition to IPv6 is imminent, because, as the successor of IPv4, IPv6 can provide a larger available address space. Existing studies have addressed the notion that IPv6-centric next generation networks are widely deployed and applied. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss rate of IPv6 are similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, for example, 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct a first-ever analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3⁎10-6, which is much lower than that of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for operators and researchers of IPv6 networks.

  6. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    International Nuclear Information System (INIS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-01-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  7. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    Science.gov (United States)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  8. Modeling the IPv6 internet AS-level topology

    Science.gov (United States)

    Xiao, Bo; Liu, Lian-dong; Guo, Xiao-chen; Xu, Ke

    2009-02-01

    To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA’s Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose of modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.

  9. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  10. Intimate Partner Violence during Pregnancy: Victim or Perpetrator? Does it make a difference?

    Science.gov (United States)

    Shneyderman, Yuliya; Kiely, Michele

    2013-01-01

    Objectives To differentiate between forms of intimate partner violence (IPV) (victim only, perpetrator only, or participating in reciprocal violence) and examine risk profiles and pregnancy outcomes. Design Prospective Setting Washington, DC, July 2001 to October 2003 Sample 1044 high-risk African-American pregnant women who participated in a randomized controlled trial to address IPV, depression, smoking, and environmental tobacco smoke exposure. Methods Multivariable linear and logistic regression Main outcome measures Low and very low birth weight, preterm and very preterm birth Results 5% of women were victims only, 12% were perpetrators only, 27% participated in reciprocal violence, and 55% reported no IPV. Women reporting reciprocal violence in the past year were more likely to drink, use illicit drugs, and experience environmental tobacco smoke exposure and were less likely to be very happy about their pregnancies. Women reporting any type of IPVwere more likely to be depressed than those reporting no IPV. Women experiencing reciprocal violence reported highest levels of depression. Women who were victims of IPV were more likely to give birth prior prematurely and deliver low and very low birth weight infants. Conclusions We conclude that women were at highest risk for pregnancy risk factors when they participated in reciprocal violence and thus might be at higher risk for long-term consequences, but women who were victims of intimate partner violence were more likely to show proximal negative outcomes like preterm birth and low birth weight. Different types of interventions may be needed for these two forms of intimate partner violence. PMID:23786367

  11. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  12. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  13. Effects of an intervention program for female victims of intimate partner violence on psychological symptoms and perceived social support

    Directory of Open Access Journals (Sweden)

    Nina B. Hansen

    2014-09-01

    Full Text Available Background: Research has documented severe mental health problems in female victims of intimate partner violence (IPV. Therefore, providing effective treatment is pivotal. Few studies have investigated the effects of intervention programs on reducing the harmful consequences of IPV. Objective: The present study examined the effects of a specific three-phase intervention program for female victims of IPV on psychological symptoms (PTSD, anxiety, and depression and perceived social support. Given that many of the women dropped out before and during the intervention program, potential differences in initial levels of psychological symptoms, perceived social support, as well as descriptive variables were explored between the women who completed the whole program and the groups of women who dropped out prematurely. Method: The initial sample consisted of 212 female victims of IPV. Symptoms of PTSD, depression, anxiety, and level of perceived social support were measured with validated scales before the start of the intervention and after completion of each treatment phase. Results: Results showed a significant effect of the intervention program on reducing psychological symptoms and increasing levels of perceived social support. Effect sizes ranged from medium to very high. Significant positive effects were found for each of the treatment phases. There were no significant differences between the women who completed the whole program and those women who dropped out prematurely in terms of initial level of symptoms and perceived social support as well as descriptive characteristics. Conclusions: Specifically developed intervention programs for female victims of IPV are effective in reducing the harmful personal consequences of IPV. Future studies should consider employing controlled study designs and address the issue of high drop out rates found in intervention studies.

  14. Análise de campo do desempenho de acessos Web em IPv6.

    OpenAIRE

    Pirani, Deivis Fernandes

    2014-01-01

    Este trabalho apresenta um estudo de campo, comparativo, sobre a utilização dos protocolos IPv4 e IPv6 no acesso a páginas web. Foi considerada a perspectiva de um usuário real deste tipo de serviço, no atual período de transição do IPv4 para o IPv6. Para que tal estudo pudesse ser realizado, foi desenvolvido um arranjo no qual três configurações de endereçamento do Protocolo de Internet, IPv4, IPv6 e Pilha Dupla (IPv4+IPv6), foram utilizadas nos acessos às 100 páginas web, com suporte ao I v...

  15. Manfacturers, service providers gear up for the next Big Thing IPV6

    CERN Multimedia

    2003-01-01

    "IPv6 apparently is the heir apparent to the current communication standard, IPv4, and communications equipment manufacturers are taking this into consideration as they design their next-generation gear" (1/2 page).

  16. Identifying intimate partner violence (IPV) during the postpartum period in a Greek sample.

    Science.gov (United States)

    Vivilaki, Victoria G; Dafermos, Vassilis; Daglas, Maria; Antoniou, Evagelia; Tsopelas, Nicholas D; Theodorakis, Pavlos N; Brown, Judith B; Lionis, Christos

    2010-12-01

    Research has highlighted the wide impact of intimate partner violence (IPV) and the public health role of community health professionals in detection of victimized women. The purpose of this study was to identify postpartum emotional and physical abuse and to validate the Greek version of the Women Abuse Screening Tool (WAST) along with its sensitivity and specificity. Five hundred seventy-nine mothers within 12 weeks postpartum were recruited from the perinatal care registers of the Maternity Departments of two public hospitals in Athens, Greece. Participants were randomly selected by clinic or shift. The WAST and the Partner Violence Screen (PVS) surveys were administered in random order to the mothers from September 2007 to January 2008. The WAST was compared with the PVS as a criterion standard. Agreement between the screening instruments was examined. The psychometric measurements that were performed included: two independent sample t tests, reliability coefficients, explanatory factor analysis using a Varimax rotation, and Principal Components Method. Confirmatory analysis-also called structural equation modeling-of principal components was conducted by Linear Structural Relations. A receiver operating characteristic (ROC) analysis was carried out to evaluate the global functioning of the scale. Two hundred four (35.6%) of the mothers screened were identified as experiencing IPV. Scores on the WAST correlated well with those on the PVS; the internal consistency of the WAST Greek version-tested using Cronbach's alpha coefficient-was found to be 0.926 and that of Guttman's split-half coefficient was 0.924. Our findings confirm the multidimensionality of the WAST, demonstrating a two-factor structure. The area under ROC curve (AUC) was found to be 0.824, and the logistic estimate for the threshold score of 0/1 fitted the model sensitivity at 99.7% and model specificity at 64.4%. Our data confirm the validity of the Greek version of the WAST in identifying IPV

  17. IPv6 testing and deployment at Prague Tier 2

    Science.gov (United States)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  18. IPv6 testing and deployment at Prague Tier 2

    International Nuclear Information System (INIS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-01-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  19. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  20. Threats and surprises behind IPv6 extension headers

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de Oliveira Schmidt, Ricardo; De Boer, Pieter Tjerk; Pras, Aiko

    2017-01-01

    The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header - a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate

  1. High-frequency mapping of the IPv6 Internet using Yarrp

    OpenAIRE

    Gaston, Eric W.

    2017-01-01

    Approved for public release; distribution is unlimited Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important component of global critical infrastructure and network policy. Unfortunately, the tools and techniques used to perform active network topology discovery were designed for Internet Protocol version 4 (IPv4), leading ...

  2. Seeking Help From Police for Intimate Partner Violence: Applying a Relationship Phase Framework to the Exploration of Victims' Evolving Needs.

    Science.gov (United States)

    Shearson, Kim M

    2017-11-01

    Intimate partner violence (IPV) is a pervasive social problem requiring multiple levels of intervention across sectors. Women experiencing IPV often seek assistance from police. Such help-seeking efforts are frequently perceived as problematic by both victims and police. A deeper understanding of victims' needs than is currently evident in the literature is needed to facilitate an appropriate, victim-centered police response across a diverse range of victim presentations. Applying a symbolic interactionist and feminist perspective and guided by a constructivist grounded theory approach, this qualitative study aimed to explore the application of Landenburger's model of entrapment in and recovery from violent relationships to understand victims' help-seeking needs when accessing police services. Semistructured interviews were conducted with 16 female victims residing in the culturally diverse Western metropolitan region of Melbourne, Australia. Fourteen victims participated in follow-up interviews. All victims primarily sought to stop the violence and hoped to find a powerful ally in police. Additional help-seeking needs were identified; subtle variations in victims' aspirations for safety, ego-support, and justice were found across the binding, enduring, disengaging, and recovery relationship phases. Victims progressed from focusing only on the immediate violent event during the binding phase to seeking to maintain long-term safety and exert their rights to protection and freedom from abuse in the recovery phase. While the operational response of police is dependent on level of violence and immediate concerns for victims' physical safety, victims' help-seeking aims are very much contingent upon their relationship phase and the associated strategies for managing the violence they use. In particular, this study provides insight into the needs of women in the enduring relationship phase, when factors such as diminished agency and low expectations of legal protection

  3. IPV among Adolescent Reproductive Health Patients: The Role of Relationship Communication

    Science.gov (United States)

    Messinger, Adam M.; Davidson, Leslie L.; Rickert, Vaughn I.

    2011-01-01

    Population-specific data on factors that affect intimate partner violence (IPV) are needed on female adolescents and young adults, a cohort at greatest risk of IPV in the United States (Rennison, 2001). Studies have frequently overlooked the role of relationship communication as a gatekeeper to IPV (Ridley & Feldman, 2003). To address this…

  4. Flow-based detection of IPv6-specific network layer attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de O. Schmidt, Ricardo; de Boer, Pieter-Tjerk; Pras, Aiko; Tuncer, Daphne; Koch, Robert; Badonne, Rémi; Stiller, Burkhard

    2017-01-01

    With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been

  5. Empirical analysis of the effects and the mitigation of IPv4 address exhaustion

    OpenAIRE

    Richter, Philipp

    2017-01-01

    IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addresses available. The Internet now faces a fundamental resource scarcity problem: The exhaustion of the available IPv4 address space. In 2011, the Internet Assigned Numbers Authority (IANA) depleted its pool of available IPv4 addresses. IPv4 scarcity is now reality. In the subsequent years, IPv4 a...

  6. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    Science.gov (United States)

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  7. Intimate partner violence in older women in Spain: prevalence, health consequences, and service utilization.

    Science.gov (United States)

    Montero, Isabel; Martín-Baena, David; Escribà-Agüir, Vicenta; Ruiz-Pérez, Isabel; Vives-Cases, Carmen; Talavera, Marta

    2013-01-01

    The purpose of this study is to estimate the prevalence of lifetime intimate partner violence (IPV) in older women and to analyze its effect on women's health and Healthcare Services utilization. Women aged 55 years and over (1,676) randomly sampled from Primary Healthcare Services around Spain were included. Lifetime IPV prevalence, types, and duration were calculated. Descriptive and multivariate procedures using logistic and multiple lineal regression models were used. Of the women studied, 29.4% experienced IPV with an average duration of 21 years. Regardless of the type of IPV experienced, abused women showed significantly poorer health and higher healthcare services utilization compared to women who had never been abused. The high prevalence detected long standing duration, negative health impact, and high healthcare services utilization, calling attention to a need for increased efforts aimed at addressing IPV in older women.

  8. Examining the Relationship Between Witnessing Intimate Partner Violence and Victimization Among Children in Saudi Arabia.

    Science.gov (United States)

    Al-Eissa, Majid A; Saleheen, Hassan N; Almuneef, Maha

    2017-03-01

    Childhood exposure to violence can lead to physical, mental, and emotional harm, whether a child is a direct victim or a witness to violent events. The aim of this study is to examine the relationship between witnessing intimate partner violence (IPV) and victimization among children. A cross-sectional, national study was conducted in secondary high schools in the five main provinces of Saudi Arabia (SA) using International Society for Prevention of Child Abuse and Neglect (ISPCAN) ISPCAN Child Abuse and Neglect Screening Tool-Child: Home version. Boys and girls, public and private schools were selected to participate. Students ( N = 16,939) aged 15 to 18 years completed the survey instrument which included demographics, different types of abuse (physical, psychological, and sexual), neglect, and witnessing IPV. Mean age of the participants was 16.8 ± 0.9 years, and 51% were boys. Eighty-one percent lived with both parents, 6% with single parent, and 2% with step-parent. Fifty-two percent of the participants witnessed IPV. Those who witnessed IPV were more likely to be abused compared with those who did not ( p violence and child protection workers could effectively respond to this problem.

  9. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  10. Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6 di Indonesia dengan Interim Maturity Level (IML

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-12-01

    Full Text Available Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000. Dengan habisnya IPv4, terdapat beberapa metode untuk melakukan migrasi ke peenomoran baru IPv6. Terkait dengan hal tersebut, penelitian ini mencoba mengukur tingkat kematangan beberapa penyelenggara jasa internet di Indonesia dalam hal implementasi IPv6 dengan menggunakan konsep Capability Maturity Model for IPv6 Implementation. Metode assesmen yang dilakukan dengan Interim Maturity Level, yaitu dengan memberikan seperangkat pertanyaan yang diisi sendiri oleh penyelenggara jasa internet. Hasil yang didapat adalah, sebagian besar penyelenggara internet masih berada pada Level 2 – Savvy.

  11. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  12. MULTI-LINK SUPPORT FOR IPV6 NETWORKS

    Directory of Open Access Journals (Sweden)

    Cüneyt Akınlar

    2016-03-01

    Full Text Available IPv6 ağ konfigürasyonu için genel pratik ağ üzerindeki her fiziksel bağ için ayrı bir altağ öneki atamaktır. Bu uygulama hem birden fazla ağ öneki gereksimine sebep olur, hem de elle yönetim ve konfigürasyon gerektirir. Buna alternatif konfigürasyon yöntemi bütün bağları IPv6 seviyesinde bir köprü ile bağlamak ve bu sayede bütün ağ için tek bir ağ öneki ataması yapmaktır. Bu metoda çoklu-bağ öneki ismi verilir. Bu makalede IPv6 ağları için çoklu-bağ öneki oto-konfigürasyonu konusu ele alınmıştır. Öncelikle tek yönlendiricili ağlar için coklu-bağ desteğinin nasıl gerçekleneceği tarif edilmiş, daha sonra bu yöntemin çok yönlendiricili ağlara nasıl uygulanacağı anlatılmıştır. Önerilen oto-konfigürasyon yöntemleri standart alıcı otokonfigürasyon protokollerini tamamlamakta ve IPv6 ağlarının yaygın kurulum ve kullanımları için gerekli tak-çalıştır metodolojine olanak sağlamaktadır

  13. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  14. IPv6 testing and deployment at Prague Tier 2

    Czech Academy of Sciences Publication Activity Database

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek; Fiala, Lukáš

    2012-01-01

    Roč. 396, č. 4 (2012), s. 1-6 ISSN 1742-6588. [International Conference on Computing in High Energy and Nuclear Physics 2012 (CHEP2012). New York, 21.05.2012-25.05.2012] Institutional research plan: CEZ:AV0Z10100502 Keywords : IPv6 grid computing HEP Subject RIV: BF - Elementary Particles and High Energy Physics http://iopscience.iop.org/1742-6596/396/4/042034

  15. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  16. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  17. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  18. Exploring the associations between intimate partner violence victimization during pregnancy and delayed entry into prenatal care: Evidence from a population-based study in Bangladesh.

    Science.gov (United States)

    Islam, Md Jahirul; Broidy, Lisa; Baird, Kathleen; Mazerolle, Paul

    2017-04-01

    Intimate partner violence (IPV) during pregnancy can have serious health consequences for mothers and newborns. The aim of the study is to explore: 1) the influence of experiencing IPV during pregnancy on delayed entry into prenatal care; and 2) whether women's decision-making autonomy and the support for traditional gender roles act to mediate or moderate the relationship between IPV and delayed entry into prenatal care. cross-sectional survey. Multivariate logistic regression models were estimated that control for various socio-demographic and pregnancy related factors to assess whether women who experienced IPV during pregnancy were more likely to delay entry into prenatal care compared with women who had not experienced IPV. The influence of traditional gender roles acceptance and decision-making autonomy were examined both as independent variables and in interaction with IPV, to assess their role as potential mediators or moderators. Chandpur district, Bangladesh. the sample comprised of 426 Bangladeshi women, aged 15-49 years. Postpartum mothers who visited vaccinations centres to receive their children's vaccinations constitute the sampling frame. almost 70% of the women surveyed reported patterns consistent with delayed entry into prenatal care. Accounting for the influence of other covariates, women who experienced physical IPV during pregnancy were 2.61 times more likely (95% CI [1.33, 5.09]) to have delayed entry into prenatal care than their counterparts who did not report physical IPV. Neither sexual nor psychological IPV victimization during pregnancy was linked with late entry into prenatal care. Both gender role attitudes and levels of autonomy mediate the effect of IPV on prenatal care. the results suggest that the high rates of IPV in Bangladesh have effects that can compromise women's health seeking behaviour during pregnancy, putting them and their developing fetus at risk. Specifically, Bangladeshi women who experience physical IPV during

  19. Optimization in Mobile IPv6 with Dynamic DNS

    OpenAIRE

    塩津, 達郎

    2005-01-01

    機器の高性能化により、モバイル端末においてもインターネットを利用した様々なアプリケーションを利用する要求が増え、無線通信環境の充実により、モバイル端末への通信を継続する仕組みが求められるようになった。 移動中の継続的な通信を可能とする技術の一つとして Mobile IPv6 がある。Mobile IPv6 にり、端末が移動しても通信を継続できる移動透過性が提供される。この移動透過性を実現するために、Mobile IPv6 では移動する端末とその端末と通信をしている端末の仲介役となる Home Agent が必要になる。ところが、仲介役となる必要のない場合でも Home Agent が仲介役として動き、無駄なパケットがインターネット上に流れてしまう。 本論文では、Mobile IPv6 という技術に加えて、Dynamic DNS という技術を用いて、Mobile IPv6 ネットワークの最適化を行う手法を提案し、性能評価を行った。...

  20. Comparison of victims' reports and court records of intimate partner violence perpetrators' criminal case outcomes.

    Science.gov (United States)

    Bell, Margret E; Larsen, Sadie E; Goodman, Lisa A; Dutton, Mary Ann

    2013-09-01

    Intimate partner violence (IPV) victims often report feeling confused and uninformed about court proceedings, including even about the final disposition of the case against their partner. This is problematic because victims' decisions in responding to subsequent abuse may be significantly influenced by their beliefs about the outcomes of prior court experiences. Also, researchers often rely on victim report of court case outcomes; discrepancies between women's reports and official records may account for some of the conflicting findings in the empirical literature. In the current study, we compared the reports of case outcome given by 81 women recruited immediately after the final hearing of an IPV-related criminal case against their perpetrator with court records of case outcome. Findings revealed a fair level of agreement between women's reports and court files that was significantly different from the level of agreement expected by chance, but far from perfect. Level of agreement increased substantially when cases involving suspended sentences were removed. In reviewing these findings, we discuss the extent to which results can or cannot be interpreted as reflecting the accuracy of women's knowledge and review their implications for IPV researchers and court systems.

  1. First-in-human safety and immunogenicity investigations of three adjuvanted reduced dose inactivated poliovirus vaccines (IPV-Al SSI) compared to full dose IPV Vaccine SSI when given as a booster vaccination to adolescents with a history of IPV vaccination at 3, 5, 12months and 5years of age.

    Science.gov (United States)

    Lindgren, Line M; Tingskov, Pernille N; Justesen, Annette H; Nedergaard, Bettina S; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Sørensen, Charlotte; Dietrich, Jes; Thierry-Carstensen, Birgit

    2017-01-23

    There is a demand of affordable IPV in the World. Statens Serum Institut (SSI) has developed three reduced dose IPV formulations adsorbed to aluminium hydroxide; 1/3 IPV-Al, 1/5 IPV-Al and 1/10 IPV-Al SSI, and now report the results of the first investigations in humans. 240 Danish adolescents, aged 10-15years, and childhood vaccinated with IPV were booster vaccinated with 1/3 IPV-Al, 1/5 IPV-Al, 1/10 IPV-Al or IPV Vaccine SSI. The booster effects (GMTRs) of the three IPV-Al SSI were compared to IPV Vaccine SSI, and evaluated for non-inferiority. The pre-vaccination GMTs were similar across the groups; 926 (type 1), 969 (type 2) and 846 (type 3) in the total trial population. The GMTRs by poliovirus type and IPV formulation were: Type 1: 17.0 (1/3 IPV-Al), 13.0 (1/5 IPV-Al), 7.1 (1/10 IPV-Al) and 42.2 (IPV Vaccine SSI). Type 2: 12.5 (1/3 IPV-Al), 13.1 (1/5 IPV-Al), 7.6 (1/10 IPV-Al) and 47.8 (IPV Vaccine SSI). Type 3: 14.5 (1/3 IPV-Al), 16.2 (1/5 IPV-Al), 8.9 (1/10 IPV-Al) and 62.4 (IPV Vaccine SSI) Thus, the three IPV-Al formulations were highly immunogenic, but inferior to IPV Vaccine SSI, in this booster vaccination trial. No SAE and no AE of severe intensity occurred. 59.2% of the subjects reported at least one AE. Injection site pain was the most frequent AE in all groups; from 24.6% to 43.3%. Injection site redness and swelling frequencies were<5% in most and<10% in all groups. The most frequent systemic AEs were fatigue (from 8.2% to 15.0%) and headache (from 15.0% to 28.3%). Most AEs were of mild intensity. In conclusion, the three IPV-Al SSI were safe in adolescents and the booster effects were satisfactory. ClinicalTrials.gov registration number: NCT02280447. Copyright © 2016. Published by Elsevier Ltd.

  2. Antibody responses of Macaca fascicularis against a new inactivated polio vaccine derived from Sabin strains (sIPV) in DTaP-sIPV vaccine.

    Science.gov (United States)

    Sato, Y; Shiosaki, K; Goto, Y; Sonoda, K; Kino, Y

    2013-05-01

    Antibody responses of Macaca fascicularis against a new tetravalent vaccine composed of diphtheria toxoid, tetanus toxoid, acellular pertussis antigens, and inactivated poliovirus derived from Sabin strains (sIPV) was investigated to predict an optimal dose of sIPV in a new tetravalent vaccine (DTaP-sIPV) prior to conducting a dose-defined clinical study. Monkeys were inoculated with DTaP-sIPVs containing three different antigen units of sIPVs: Vaccine A (types 1:2:3 = 3:100:100 DU), Vaccine B (types 1:2:3 = 1.5:50:50 DU), and Vaccine C (types 1:2:3 = 0.75:25:25 DU). There was no difference in the average titers of neutralizing antibody against the attenuated or virulent polioviruses between Vaccines A and B. The average neutralizing antibody titers of Vaccine C tended to be lower than those of Vaccines A and B. The sIPV antigens did not affect the anti-diphtheria or anti-tetanus antibody titers of DTaP-sIPV. Furthermore, the average neutralizing antibody titers of Vaccine A against the attenuated and virulent polioviruses were comparable between M. fascicularis and humans. These results suggest that M. fascicularis may be a useful animal model for predicting the antibody responses to sIPVs in humans, and that it may be likely to reduce the amount of sIPVs contained in DTaP-sIPVs, even for humans. Copyright © 2013 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  3. АНАЛІЗ МЕТОДІВ ВИРІШЕННЯ ПРОБЛЕМ ЩОДО ВПРОВАДЖЕННЯ ПРОТОКОЛУ IPV6

    OpenAIRE

    Созонник, Галина Дмитрівна; Гамза, Дмитро Євгенійович

    2017-01-01

    IPv6 implementation problems research IPv6 implementation problems research, analysis of the IPv6 advantages and its’ compatibility with IPv4; methods of transition from IPv6 to IPv4, transitional technologies

  4. Implantación de IPv6 : red, mecanismos de transición IPv4-IPv6, servicios de aplicación y migración de aplicaciones

    OpenAIRE

    Rodríguez Hervella, Juan Francisco

    2003-01-01

    El presente proyecto fin de carrera trata los aspectos más importantes de la gestión y migración de las redes IP hacia el nuevo protocolo de red IPv6 y pone gran énfasis en experiencias de implantación de los mismos. A lo largo de este proyecto se profundiza sobre los distintos mecanismos de transición IPv4/IPv6 existentes, concretamente se describen y se prueban (en entornos Linux y FreeBSD) los siguientes: .Túneles 6t04, automáticos, configurados. .Mecanismo DSTM, TRT, ISATAP, NAT-PT. Tambi...

  5. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  6. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  7. Secondary victims of rape

    DEFF Research Database (Denmark)

    Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask

    2012-01-01

    secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...

  8. Characteristics of family violence victims presenting to emergency departments in Hong Kong.

    Science.gov (United States)

    Chan, Ko Ling; Choi, Wai Man Anna; Fong, Daniel Y T; Chow, Chun Bong; Leung, Ming; Ip, Patrick

    2013-01-01

    The Emergency Department (ED) has been shown to be a valuable location to screen for family violence. To investigate the characteristics of family violence victims presenting to EDs in a Chinese population in Hong Kong. This study examined a retrospective cohort of patients presenting to the Accident and Emergency Departments of three regional hospitals in the Kwai Tsing district of Hong Kong for evaluation and management of physical injuries related to family violence during the period of January 1, 1997 to December 31, 2008. A total of 15,797 patients were assessed. The sample comprised cases of intimate partner violence (IPV; n=10,839), child abuse and neglect (CAN; n=3491), and elder abuse (EA; n=1467). Gender differences were found in patterns of ED utilization among the patients. The rates of readmission were 12.9% for IPV, 12.8% for CAN, and 8.9% for EA. Logistic regression showed that being male, being discharged against medical advice, and arriving at the hospital via ambulance were the common factors associated with readmission to the EDs for patients victimized by IPV and CAN. This study investigates the victim profile of a large cohort of a Chinese population, providing a unique data set not previously released in this cultural or medical system. The findings give insights to early identification of victims of family violence in the EDs and suggest that screening techniques focused on multiple forms of family violence would improve identification of violence cases. Multidisciplinary collaboration between health, legal, and social service professionals is also warranted to meet the various needs of victims and to reduce hospital readmissions. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Evolution of IPv6 Internet topology with unusual sudden changes

    Science.gov (United States)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  10. Evolution of IPv6 Internet topology with unusual sudden changes

    International Nuclear Information System (INIS)

    Ai Jun; Su Zhan; Li Hui; Zhao Hai; Carley, Kathleen M.

    2013-01-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased

  11. Protocolo IPv6 com pilha dupla em um campus universitário

    Directory of Open Access Journals (Sweden)

    Fernando Barreto

    2015-11-01

    Full Text Available Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil para administradores de rede IPv4. Com o objetivo de reduzir essa dificuldade, este artigo apresenta uma comparação entre IPv4 e IPv6 com foco no dia a dia de administração de rede de campus. Esse artigo também apresenta as soluções, experiências e lições adquiridas de uma implementação de sucesso do IPv6, utilizando a técnica de Pilha Dupla em um pequeno campus universitário.

  12. RAZVOJ MODELA IN SIMULACIJA IZČRPANJA IPv4 NASLOVNEGA PROSTORA

    OpenAIRE

    Ciber, Peter

    2014-01-01

    Magistrsko delo obravnava razvoj modela in simulacijo izčrpanja IPv4 naslovnega prostora. Za dodeljevanje IPv4 naslovnega prostora skrbi organizacija IANA, ki je po petih celinah sveta dodelila velike kose IPv4 naslovnega prostora. V Evropi tako za nadaljnjo razdelitev skrbi organizacija RIPE NCC, v Afriki AFRINIC, v azijsko-pacifiški regiji APNIC, v Ameriki ARIN v Latinski Ameriki in Karibih pa LACNIC. Zanimalo nas je koliko in kako je IANA razdelila IPv4 naslove po celinah in kako so region...

  13. CONFIGURACIÓN DE UNA RED DE NUEVA GENERACIÓN PARA CONECTIVIDAD CON INTERNET RESPALDADO POR UN SERVICIO DNS CON SOPORTE PARA IPV4 E IPV6.

    Directory of Open Access Journals (Sweden)

    Carlos Andrés Martínez

    2012-05-01

    Full Text Available Se presentan las características mas representativas de la implementación de la isla ipv6 del centro de computación de alto desempeño CECAD, realizando pruebas de conexión y desempeño en el tráfico interno con las subredes de la Universidad Distrital y posteriormente con su conexión a Internet a través del protocolo NAT-PT secundado por un servidor de nombres de domino recursivo como base de conectividad y soporte sobre estructuras Ipv4 e Ipv6 nativas.

  14. Victimization of Obese Adolescents

    Science.gov (United States)

    Robinson, Sabrina

    2006-01-01

    Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…

  15. Sudden death victims

    NARCIS (Netherlands)

    Ceelen, Manon; van der Werf, Christian; Hendrix, Anneke; Naujocks, Tatjana; Woonink, Frits; de Vries, Philip; van der Wal, Allard; Das, Kees

    2015-01-01

    The goal of this study was to ascertain accordance between cause of death established by the forensic physician and autopsy results in young sudden death victims in the Netherlands. Sudden death victims aged 1-45 years examined by forensic physicians operating in the participating regions which also

  16. Sexual Victimization of Youth

    Science.gov (United States)

    Small, Kevonne; Zweig, Janine M.

    2007-01-01

    An estimated 7.0% to 8.1% of American youth report being sexually victimized at some point in their life time. This article presents a background to youth sexual victimization, focusing on prevalence data, challenging issues when studying this problem, risk factors, and common characteristics of perpetrators. Additionally, a type of sexual…

  17. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  18. Análisis de rendimiento en redes IPv6

    Directory of Open Access Journals (Sweden)

    Andrés Eugenio Enríquez-Lenis

    2015-01-01

    Full Text Available El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. El método utilizado fue el empírico, y la metodología seguida, el modelo en cascada, paradigma del ciclo de vida clásico en ingeniería que exige un enfoque sistemático y secuencial. El experimento se desarrolló en el laboratorio de telemática de la Facultad de Ingeniería, en la Universidad Libre en Cali, donde se dispuso de 8 enrutadores, 4 conmutadores y 5 computadores personales. Los instrumentos utilizados fueron el analizador de protocolos Wireshark, analizador de paquetes PRTG, SYSLOG y SNMP server para captura de alarmas y eventos, y herramientas para pruebas en la red: tracert/ traceroute, ping y telnet. Como resultados se observa que el rendimiento de una red IPv6 depende del grado de congestión y del tipo de tráfico que circula en la misma. La investigación permite concluir que aunque se disponga de mecanismos complejos de Calidad de Servicio y Diferenciación de Servicios en Internet, en condiciones de saturación, ninguno de estos mecanismos permite garantizar que los servicios y aplicaciones sensibles, funcionen adecuadamente.

  19. Peer Influence on IPV by Young Adult Males: Investigating the Case for a Social Norms Approach.

    Science.gov (United States)

    McKool, Marissa; Stephenson, Rob; Winskell, Kate; Teten Tharp, Andra; Parrott, Dominic

    2017-08-01

    Nearly 32% of women report experiencing physical violence from an intimate partner and more than 8% report being raped by a significant other in their lifetime. Young people's perceptions that their peers perpetrate relationship violence have been shown to increase the odds of self-reported perpetration. Yet, limited research has been conducted on this relationship as individuals begin to age out of adolescence. The present study sought to examine the link between the perception of peer perpetration of intimate partner violence (IPV) and self-reported IPV perpetration among a sample of predominately young adult (21-35 years) males. This study also explored the discordance between the perception of peer IPV behavior and self-reported perpetration. Data from 101 male peer dyads ( n = 202) were taken from a study on the effects of alcohol and bystander intervention in Atlanta, Georgia. Thirty-six percent ( n = 73) of men reported perpetrating physical IPV and 67% ( n = 135) reported perpetrating sexual IPV in the past 12 months. Nearly 35% ( n = 55) of the sample reported that none of their peers had perpetrated physical IPV, which contradicted their friend's self-report of physical IPV perpetration. Similarly, 68% ( n = 115) of the men perceived none of their peers to have perpetrated sexual IPV, which contradicted their friend's self-report of sexual IPV perpetration. Discordance variables were significantly associated with self-reported perpetration for both physical (χ 2 = 152.7, p peer IPV perpetration among young adult males. Findings suggest a traditional social norms approach to IPV prevention, which seeks to persuade individuals that negative behaviors are less common than perceived, may not be the best approach given a significant number of men believed their friends were nonviolent when they had perpetrated violence.

  20. Decay of Sabin inactivated poliovirus vaccine (IPV-boosted poliovirus antibodies

    Directory of Open Access Journals (Sweden)

    Sonia Resik

    2015-01-01

    Conclusion: The decay of poliovirus antibodies over a 21–22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  1. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  2. IPv6 Monitoring in Nederland: De derde meting : TNO-White paper

    NARCIS (Netherlands)

    Boen-Leo, M.S.A.; Hartog, T.; Holtzer, A.C.G.; Schotanus, H.A.; Smets, R.C.J.; Tijmes, M.R.

    2011-01-01

    Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het

  3. Something From Nothing (There): Collecting Global IPv6 Datasets from DNS

    NARCIS (Netherlands)

    Fiebig, T.; Borgolte, Kevin; Hao, Shuang; Kruegel, Christopher; Vigna, Giovanny; Spring, Neil; Riley, George F.

    2017-01-01

    Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to

  4. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  5. IPv6:n käyttöönotto PK-yrityksessä

    OpenAIRE

    Salonen, Arttu Petteri

    2011-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, kuinka IPv6-yhteydet otetaan käyt-töön PK-yrityksessä. Työssä selvitetään minkälaiset vaatimukset IPv6 asettaa lait-teistolle ja minkälaisia käytännön asioita yrityksen täytyy huomioida IPv6:n käyt-töönotossa. Lisäksi työssä on laboratoriosimulaation avulla havainnollistettu eri käyt-töjärjestelmien tukea IPv6:lle ja käyttöönottoon liittyviä reititin- ja osoitekonfiguraati-oita. Käyttöönoton lisäksi opinnäytetyössä esitellään IPv6-protokoll...

  6. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  7. IPv6-Based Smart Metering Network for Monitoring Building Electricity

    Directory of Open Access Journals (Sweden)

    Dong Xu

    2013-01-01

    Full Text Available A smart electricity monitoring system of building is presented using ZigBee and internet to establish the network. This system consists of three hardware layers: the host PC, the router, and the sensor nodes. A hierarchical ant colony algorithm is developed for data transmission among the wireless sensor nodes. The wireless communication protocol is also designed based on IPv6 protocol on IEEE 802.15.4 wireless network. All-IP approach and peer-to-peer mode are integrated to optimize the network building. Each node measures the power, current, and voltage and transmits them to the host PC through the router. The host software is designed for building test characteristics, having a tree hierarchy and a friendly interface for the user. The reliability and accuracy of this monitoring system are verified in the experiment and application.

  8. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  9. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  10. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  11. Inactivated polio vaccine development for technology transfer using attenuated Sabin poliovirus strains to shift from Salk-IPV to Sabin-IPV.

    Science.gov (United States)

    Bakker, Wilfried A M; Thomassen, Yvonne E; van't Oever, Aart G; Westdijk, Janny; van Oijen, Monique G C T; Sundermann, Lars C; van't Veld, Peter; Sleeman, Eelco; van Nimwegen, Fred W; Hamidi, Ahd; Kersten, Gideon F A; van den Heuvel, Nico; Hendriks, Jan T; van der Pol, Leo A

    2011-09-22

    Industrial-scale inactivated polio vaccine (IPV) production dates back to the 1960s when at the Rijks Instituut voor de Volksgezondheid (RIV) in Bilthoven a process was developed based on micro-carrier technology and primary monkey kidney cells. This technology was freely shared with several pharmaceutical companies and institutes worldwide. In this contribution, the history of one of the first cell-culture based large-scale biological production processes is summarized. Also, recent developments and the anticipated upcoming shift from regular IPV to Sabin-IPV are presented. Responding to a call by the World Health Organization (WHO) for new polio vaccines, the development of Sabin-IPV was continued, after demonstrating proof of principle in the 1990s, at the Netherlands Vaccine Institute (NVI). Development of Sabin-IPV plays an important role in the WHO polio eradication strategy as biocontainment will be critical in the post-OPV cessation period. The use of attenuated Sabin strains instead of wild-type Salk polio strains will provide additional safety during vaccine production. Initially, the Sabin-IPV production process will be based on the scale-down model of the current, and well-established, Salk-IPV process. In parallel to clinical trial material production, process development, optimization and formulation research is being carried out to further optimize the process and reduce cost per dose. Also, results will be shown from large-scale (to prepare for future technology transfer) generation of Master- and Working virus seedlots, and clinical trial material (for phase I studies) production. Finally, the planned technology transfer to vaccine manufacturers in low and middle-income countries is discussed. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Innovative IPV from attenuated Sabin poliovirus or newly designed alternative seed strains.

    Science.gov (United States)

    Hamidi, Ahd; Bakker, Wilfried A M

    2012-11-01

    This article gives an overview of the patent literature related to innovative inactivated polio vaccine (i-IPV) based on using Sabin poliovirus strains and newly developed alternative recombinant poliovirus strains. This innovative approach for IPV manufacturing is considered to attribute to the requirement for affordable IPV in the post-polio-eradication era, which is on the horizon. Although IPV is a well-established vaccine, the number of patent applications in this field was seen to have significantly increased in the past decade. Currently, regular IPV appears to be too expensive for universal use. Future affordability may be achieved by using alternative cell lines, alternative virus seed strains, improved and optimized processes, dose sparing, or the use of adjuvants. A relatively short-term option to achieve cost-price reduction is to work on regular IPV, using wild-type poliovirus strains, or on Sabin-IPV, based on using attenuated poliovirus strains. This price reduction can be achieved by introducing efficiency in processing. There are also multiple opportunities to work on dose sparing, for example, by using adjuvants or fractional doses. Renewed interest in this field was clearly reflected in the number and diversity of patent applications. In a later stage, several innovative approaches may become even more attractive, for example the use of recombinant virus strains or even a totally synthetic vaccine. Currently, such work is mainly carried out by research institutes and universities and therefore clinical data are not available.

  13. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  14. Factors associated with recent intimate partner violence experience amongst currently married women in Afghanistan and health impacts of IPV: a cross sectional study.

    Science.gov (United States)

    Gibbs, Andrew; Corboz, Julienne; Jewkes, Rachel

    2018-05-03

    Intimate partner violence (IPV) is exceedingly common in conflict and post-conflict settings. We first seek to describe factors associated with past 12 month IPV amongst currently married women in Afghanistan, focused on the factors typically assumed to drive IPV. Second, to describe whether IPV is independently associated with a range of health outcomes. Cross-sectional analysis of currently married Afghan women, comprising the baseline study of a trial to prevent IPV. We use multinomial regression, reporting adjusted relative-risk ratios to model factors associated with the different forms of IPV, comparing no IPV, emotional IPV only, and physical IPV and emotional IPV. Second we assessed whether experience of emotional IPV, and physical IPV, were independently associated with health outcomes, reporting adjusted ß coefficients and adjusted odds ratios as appropriate. Nine hundred thirty five currently married women were recruited, 11.8% experienced only emotional IPV and 23.1% experienced physical and emotional IPV. Emotional IPV only was associated with attending a women's group, greater food insecurity, her husband having more than one wife, experiencing other forms of family violence, and more inequitable community gender norms. Experiencing both physical IPV and emotional IPV was associated with attending a women's group, more childhood trauma, husband cruelty, her husband having more than one wife, experiencing other forms of family violence, more inequitable community gender norms, and greater reported disability. Emotional IPV and physical IPV were independently associated with worse health outcomes. IPV remains common in Afghanistan. Economic interventions for women alone are unlikely to prevent IPV and potentially may increase IPV. Economic interventions need to also work with husbands and families, and work to transform community level gender norms. NCT03236948 . Registered 28 July 2017, retrospectively registered.

  15. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies

    OpenAIRE

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W.

    2015-01-01

    Introduction: We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21–22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. Methods: In 2012, 60 healthy adult males aged 19–23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvant...

  16. NASA Lewis advanced IPV nickel-hydrogen technology

    Science.gov (United States)

    Smithrick, John J.; Britton, Doris L.

    1993-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts. Some of the advancements are as follows: to use 26 percent potassium hydroxide electrolyte to improve cycle life and performance, to modify the state of the art cell design to eliminate identified failure modes and further improve cycle life, and to develop a lightweight nickel electrode to reduce battery mass, hence reduce launch and/or increase satellite payload. A breakthrough in the LEO cycle life of individual pressure vessel nickel-hydrogen battery cells was reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 accelerated LEO cycles at 80 percent DOD compared to 3,500 cycles for cells containing 31 percent KOH. Results of the boiler plate cell tests have been validated at NWSC, Crane, Indiana. Forty-eight ampere-hour flight cells containing 26 and 31 percent KOH have undergone real time LEO cycle life testing at an 80 percent DOD, 10 C. The three cells containing 26 percent KOH failed on the average at cycle 19,500. The three cells containing 31 percent KOH failed on the average at cycle 6,400. Validation testing of NASA Lewis 125 Ah advanced design IPV nickel-hydrogen flight cells is also being conducted at NWSC, Crane, Indiana under a NASA Lewis contract. This consists of characterization, storage, and cycle life testing. There was no capacity degradation after 52 days of storage with the cells in the discharged state, on open circuit, 0 C, and a hydrogen pressure of 14.5 psia. The catalyzed wall wick cells have been cycled for over 22,694 cycles with no cell failures in the continuing test. All three of the non-catalyzed wall wick cells failed (cycles 9,588; 13,900; and 20,575). Cycle life test results of the Fibrex nickel electrode has demonstrated the feasibility of an improved nickel electrode giving a higher specific energy nickel-hydrogen cell. A nickel-hydrogen boiler plate cell using an 80

  17. Adolescent sexual victimization

    DEFF Research Database (Denmark)

    Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P

    2012-01-01

    at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early......The present study set out to investigate predictors of first time adolescent peer-on-peer sexual victimization (APSV) among 238 female Grade 9 students from 30 schools in Denmark. A prospective research design was utilized to examine the relationship among five potential predictors as measured...... sexual onset and failing to signal sexual boundaries did not. The present study identifies specific risk factors for first time sexual victimization that are potentially changeable. Thus, the results may inform prevention initiatives targeting initial experiences of APSV....

  18. Victimization and pain

    Directory of Open Access Journals (Sweden)

    Małgorzata K. Szerla

    2013-12-01

    Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.

  19. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  20. Teoretisk och praktisk genomgång av IPv6 och dess säkerhetsaspekter

    OpenAIRE

    Andersson, David

    2012-01-01

    Den här uppsatsen går teoretiskt och praktiskt igenom IPv6 för att skapa en förståelse för det nya protokollet. Uppsatsen beskriver utöver den teoretiska genomgången av protokollet även det praktiska arbete som ligger bakom implementationen som är tänkt att kunna ge såväl privatpersoner som mindre organisationer tillgång till en säker IPv6 lösning även om Internetleverantören endast kan erbjuda IPv4.   Arbetet är gjort på eget initiativ då behovet av kunskap kring IPv6 växer lavinartat och då...

  1. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS ... Keywords: IoT; Cooja framework; Contiki OS; packet monitoring.

  2. Metadata Modelling of the IPv6 Wireless Sensor Network in the Heihe River Watershed

    Directory of Open Access Journals (Sweden)

    Wanming Luo

    2013-03-01

    Full Text Available Environmental monitoring in ecological and hydrological watershed-scale research is an important and promising area of application for wireless sensor networks. This paper presents the system design of the IPv6 wireless sensor network (IPv6WSN in the Heihe River watershed in the Gansu province of China to assist ecological and hydrological scientists collecting field scientific data in an extremely harsh environment. To solve the challenging problems they face, this paper focuses on the key technologies adopted in our project, metadata modeling for the IPv6WSN. The system design introduced in this paper provides a solid foundation for effective use of a self-developed IPv6 wireless sensor network by ecological and hydrological scientists.

  3. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  4. IPv6 ネットワークの構築

    OpenAIRE

    山田, 純一

    2008-01-01

    富山大学では2006年,国立情報学研究所より,IPv6(Internet Protocol Version 6)の割り当てが承認された。IPv6は現在使用されているIPアドレスであるIPv4(Internet Protocol Version 4)の枯渇問題を解消するために開発されたIPアドレスである。このIPv6が誕生してから数年,今さらではあるがローカル環境にてIPv6ネットワークを構築し,検証を行ったので,ここに報告する。

  5. Between "Victims" and "Criminals"

    DEFF Research Database (Denmark)

    Plambech, Sine

    2014-01-01

    This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...... trafficking”; others were categorized as undocumented migrants—“criminals” guilty of violating immigration laws. Despite the growing political attention devoted to protecting victims of trafficking, I argue that in areas of Nigeria prone to economic insecurity and gender-based violence, the categories...

  6. Perpetrator or victim?

    DEFF Research Database (Denmark)

    Hansen, Helle Rabøl

    Paper 3: HAN091384 Victim, Perpetrator and Pupil - Teacher Perspectives on Peer Bullying Helle Rabøl Hansen, University of Aarhus This paper investigates the approaches and strategies taken up by two crucial actors in relation to bullying in schools: 1. documents indicating school policies...... and identifies a legally informed matrix, which points out unequivocal positions of perpetrators and victims. The policy document mixes the definition practices, which derive from the Olweus tradition on bullying research, into a law informed kind of discourse. Subsequently the policy document iterates...

  7. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems.

    Science.gov (United States)

    Park, Subin; Lee, Yeeun; Jang, Hyesue; Jo, Minkyung

    2017-05-19

    We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES), exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  8. [A sociography of elderly victims of family violence in Portugal].

    Science.gov (United States)

    Gil, Ana Paula; Santos, Ana João; Kislaya, Irina; Santos, César; Mascoli, Luísa; Ferreira, Alexandra Inácio; Vieira, Duarte Nuno

    2015-06-01

    This article presents data on violence against persons aged 60 years or older and living in Portugal for at least 12 months. The cross-sectional descriptive study collected data with a face-to-face questionnaire applied to victims that had sought assistance at three government institutions and one non-governmental support service for victims. The non-probabilistic sample included 510 victims of violence in family settings. Physical and psychological violence were the most common (87.8% and 69.6%, respectively). Financial violence was reported by 47.5% of the victims, followed by sexual assault (7.5%) and neglect (6.5%). The majority of victims (74.1%) reported more than one type of violence. Victims were mostly women, and mean age was 70.7 years. Most of the perpetrators belonged to the nuclear family, namely spouses or partners, sons/sons-in-law, and daughters/daughters-in-law. However, differences were observed according to victim's gender. The results indicate that violence is not a uniform phenomenon, presenting different configurations.

  9. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems

    Directory of Open Access Journals (Sweden)

    Subin Park

    2017-05-01

    Full Text Available We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES, exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  10. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies.

    Science.gov (United States)

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W

    We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21-22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. In 2012, 60 healthy adult males aged 19-23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvanted Sabin-IPV (aSabin-IPV), or conventional Salk-IPV. In the original study, blood was collected at days 0 (before) and 28 (after vaccination), respectively. In this study, an additional blood sample was collected 21-22 months after vaccination, and tested for neutralizing antibodies to Sabin poliovirus types 1, 2 and 3. We collected sera from 59/60 (98.3%) subjects; 59/59 (100%) remained seropositive to all poliovirus types, 21-22 months after vaccination. The decay curves were very similar among the study groups. Between day 28 and 21-22 months, there was a reduction of ⩾87.4% in median antibody levels for all poliovirus types in all study groups, with no significant differences between the study groups. The decay of poliovirus antibodies over a 21-22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  11. Estudi d'implantació de la IPv6 al CTTC

    OpenAIRE

    Escoda Ramon, Jordi

    2017-01-01

    In recent years, the number of devices connected to Internet has increased exponentially and in fact, it is estimated that the demand keep on increasing. When IPv4 protocol was introduced, this evolution was not expected. Over the years several limitations have arosen, including scalability and the unsustainable growth of the Internet routing table. In the late 90s, IPv6 protocol was defined to solve these issues and add new features. Currently, the Centre Tecnològic de Telecomunicacions de C...

  12. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  13. Stories of Victimization: Self-Positioning and Construction of Gender in Narratives of Abused Women.

    Science.gov (United States)

    Jarnkvist, Karin; Brännström, Lotta

    2016-11-01

    The objective of this article is to analyze how women who have been victims of intimate partner violence (IPV) position themselves in relation to the image of the "ideal victim" and how gender is constructed in that positioning. There is a need for a gender analysis framework to understand how various forms of femininity are constructed and how narratives linked to this can either maintain a woman in an abusive relationship or encourage her to leave. Christie's theory of the "ideal victim" and Connell's gender theory are applied in this study, in which the narratives of 14 female IPV victims in Sweden are analyzed using a narrative method. Three strings of narratives, representing different forms of femininity, are revealed in the material. The master narrative of the ideal victim reveals a form of femininity that describes women as inferior in relation to men. In the alternative narrative, the narrator positions herself as inferior in relation to the offender but discusses resistance. She describes herself as a caring mother who risks a great deal to protect her children. In the counter-narrative, the narrator positions herself as strong and independent in relation to the offender and as a strong and caring mother. The positioning of different narrators may shift depending on the duration of the relationship and the type of violence. The narrator may also take different positions during different phases of the story. However, the dominant narrative among the narrators is the story of the caring mother, which may have several functions and can partially be understood as a sign of the strong discourse of motherhood in society. The study contributes to a more profound understanding of the complexity related to women's own positioning and reveals that awareness is required when attempting to understand the narratives and behavior of abused women.

  14. Attracting Assault: Victims' Nonverbal Cues.

    Science.gov (United States)

    Grayson, Betty; Stein, Morris I.

    1981-01-01

    Describes a study in which prison inmates convicted of assault identified potential victims from videotapes. A lab analysis code was used to determine which nonverbal body movement categories differentiated victims and nonvictims. (JMF)

  15. Victims and Heroes

    DEFF Research Database (Denmark)

    Højbjerg, Christian K.

    2010-01-01

    Victimization, autochthony and citizenship, power and nation-building constitute recurrent, interrelated themes in post-war Manding historical memory in the border area between Liberia and Guinea. While the perceived history of the Manding diverges from academic, historical knowledge as well...

  16. Victim Simulator for Victim Detection Radar

    Science.gov (United States)

    Lux, James P.; Haque, Salman

    2013-01-01

    Testing of victim detection radars has traditionally used human subjects who volunteer to be buried in, or climb into a space within, a rubble pile. This is not only uncomfortable, but can be hazardous or impractical when typical disaster scenarios are considered, including fire, mud, or liquid waste. Human subjects are also inconsistent from day to day (i.e., they do not have the same radar properties), so quantitative performance testing is difficult. Finally, testing a multiple-victim scenario is difficult and expensive because of the need for multiple human subjects who must all be coordinated. The solution is an anthropomorphic dummy with dielectric properties that replicate those of a human, and that has motions comparable to human motions for breathing and heartbeat. Two airfilled bladders filled and drained by solenoid valves provide the underlying motion for vinyl bags filled with a dielectric gel with realistic properties. The entire assembly is contained within a neoprene wetsuit serving as a "skin." The solenoids are controlled by a microcontroller, which can generate a variety of heart and breathing patterns, as well as being reprogrammable for more complex activities. Previous electromagnetic simulators or RF phantoms have been oriented towards assessing RF safety, e.g., the measurement of specific absorption rate (SAR) from a cell phone signal, or to provide a calibration target for diagnostic techniques (e.g., MRI). They are optimized for precise dielectric performance, and are typically rigid and immovable. This device is movable and "positionable," and has motion that replicates the small-scale motion of humans. It is soft (much as human tissue is) and has programmable motions.

  17. Service seeking experiences of college-aged sexual and intimate partner violence victims with a mental health and/or behavioral disability.

    Science.gov (United States)

    Nichols, Emily M; Bonomi, Amy; Kammes, Rebecca; Miller, Elizabeth

    2018-02-15

    To examine mental health service experiences following sexual violence (SV) and intimate partner violence (IPV) victimization among college women with a disability. College women (n = 27, ages 19 to 24) with a disability who experienced at least one SV/IPV occurrence; interviewed July/August 2016. Qualitative study using in-depth interviews, with thematic analysis. Women tended to wait several months (or did not seek care at all) following SV/IPV, because they downplayed their experience (e.g., not wanting to label an experience as "rape"). Those seeking services primarily did so because of escalating mental health concerns. Among service seekers, women were satisfied when professionals validated their experiences/concerns; and were dissatisfied when faced with extended wait time for care and/or professionals unskilled with SV/IPV and mental health. However, women still sought care following negative experiences. Improved access to integrated care for SV/IPV and mental health, along with skilled professionals, is essential.

  18. Examining cumulative victimization, community violence exposure, and stigma as contributors to PTSD symptoms among high-risk young women.

    Science.gov (United States)

    Kennedy, Angie C; Bybee, Deborah; Greeson, Megan R

    2014-05-01

    This study examines patterns of lifetime victimization within the family, community violence exposure, and stigma as contributors to posttraumatic stress disorder (PTSD) symptoms within a sample of 198 high-risk young women who are pregnant or parenting. We used cluster analysis to identify 5 profiles of cumulative victimization, based on participants' levels of witnessing intimate partner violence (IPV), physical abuse by an adult caregiver, and sexual victimization, all beginning by age 12. Hierarchical regression was used to examine these 5 clusters (ranging from a High All Victimization cluster characterized by high levels of all 3 forms of violence, to a Low All Victimization cluster characterized by low levels of all 3 forms), along with community violence exposure and stigma, as predictors of PTSD symptoms. We found that 3 of the cumulative victimization clusters, in comparison with Low All Victimization, were significant predictors of PTSD symptoms, as was stigma, while community violence exposure was not a significant predictor. PsycINFO Database Record (c) 2014 APA, all rights reserved

  19. Child Abuse, Risk in Male Partner Selection, and Intimate Partner Violence Victimization of Women of the European Union.

    Science.gov (United States)

    Herrero, Juan; Torres, Andrea; Rodríguez, Francisco J

    2018-06-05

    The revictimization of women during the life cycle has attracted the interest of many researchers in recent years. In this study, we examined the relationship between the experience of child abuse and the subsequent victimization by a male partner in adulthood. Specifically, we proposed that childhood abuse experiences negatively affect the development of healthy interpersonal relationships in adulthood. Thus, some female victims of child abuse are more likely to select potentially abusive intimate male partners. Data from 23,863 heterosexual women from the 28 countries of the European Union who were living with their partners at the time of the study were used. We investigated the association between child abuse, partner's adherence to traditional gender roles, and general violence and intimate partner violence (IPV) against women. Multilevel structural equation modeling (MSEM) results indicated that child abuse is positively related to the partner's traditional gender role and general violence, which in turn predict IPV. Countries' level of human development was found to affect this process. We found support for the hypothesis that child abuse is related to IPV partially because it influences partner selection in adulthood. Thus, when they become adults, girls abused in childhood tend to select partners who are either traditional or generally violent. There is a persistent influence of social structural conditions (i.e., country's human development) throughout this process.

  20. Immigrants as crime victims: Experiences of personal nonfatal victimization.

    Science.gov (United States)

    Wheeler, Krista; Zhao, Weiyan; Kelleher, Kelly; Stallones, Lorann; Xiang, Huiyun

    2010-04-01

    Immigrants to the United States are disproportionately victims of homicide mortality in and outside the workplace. Examining their experiences with nonfatal victimization may be helpful in understanding immigrant vulnerability to violence. We compared the annual prevalence of nonfatal personal victimization experienced by immigrant and US-born adults by sociodemographics, employment, occupation, industry, smoking, alcohol and drug use using data from Wave 1 National Epidemiologic Survey on Alcohol and Related Conditions. The prevalence of victimization among immigrants was comparable to that among US-born adults [3.84% (95% CI: 3.18-4.63) vs. 4.10% (95% CI: 3.77-4.44)]. Lower percentages of victimization experienced by immigrants were seen among the unmarried, those age 30-44 years, and among residents of central city areas as compared to those groups among the US-born. For immigrants entering the US as youth, the victimization prevalence declines with greater years of residency in US. Multivariate logistic regression models suggest that, the odds of victimization was significantly associated with age, family income, marital status, central city residency, smoking, and drug use while employment status was not a significant factor. Immigrant workers with farming/forestry occupations might face a higher risk of being victims of violence than their US-born counterparts. The prevalence of victimization among immigrants was comparable to that among US-born adults. Employment status and industry/occupation overall were not significant risk factors for becoming victims of violence. (c) 2010 Wiley-Liss, Inc.

  1. Safety and immunogenicity of a primary series of Sabin-IPV with and without aluminum hydroxide in infants.

    Science.gov (United States)

    Verdijk, Pauline; Rots, Nynke Y; van Oijen, Monique G C T; Weldon, William C; Oberste, M Steven; Okayasu, Hiromasa; Sutter, Roland W; Bakker, Wilfried A M

    2014-09-03

    An inactivated poliovirus vaccine (IPV) based on attenuated poliovirus strains (Sabin-1, -2 and -3) was developed for technology transfer to manufacturers in low- and middle-income countries in the context of the global polio eradication initiative. Safety and immunogenicity of Sabin-IPV (sIPV) was evaluated in a double-blind, randomized, controlled, dose-escalation trial in the target population. Healthy infants (n=20/group) aged 56-63 days, received a primary series of three intramuscular injections with low-, middle- or high-dose sIPV with or without aluminum hydroxide or with the conventional IPV based on wild poliovirus strains (wIPV). Virus-neutralizing titers against both Sabin and wild poliovirus strains were determined before and 28 days after three vaccinations. The incidence of local and systemic reactions was comparable with the wIPV. Seroconversion rates after three vaccinations were 100% for type 2 and type 3 polioviruses (both Sabin and wild strains) and 95-100% for type 1 polioviruses. Median titers were high in all groups. Titers were well above the log2(titer) correlated with protection (=3) for all groups. Median titers for Sabin-2 were 9.3 (range 6.8-11.5) in the low-dose sIPV group, 9.2 (range 6.8-10.2) in the low-dose adjuvanted sIPV group and 9.8 (range 5.5-15.0) in the wIPV group, Median titers against MEF-1 (wild poliovirus type 2) were 8.2 (range 4.8-10.8) in the low-dose sIPV group, 7.3 (range 4.5-10.2) in the low-dose adjuvanted Sabin-IPV group and 10.3 (range 8.5-17.0) in the wIPV group. For all poliovirus types the median titers increased with increasing dose levels. sIPV and sIPV adjuvanted with aluminum hydroxide were immunogenic and safe at all dose levels, and comparable with the wIPV. EudraCTnr: 2011-003792-11, NCT01709071. Copyright © 2014. Published by Elsevier Ltd.

  2. Analysis of the dose-sparing effect of adjuvanted Sabin-inactivated poliovirus vaccine (sIPV).

    Science.gov (United States)

    Li, Zhuofan; Ding, Wenting; Guo, Qi; Liu, Ze; Zhu, Zhe; Song, Shaohui; Li, Weidong; Liao, Guoyang

    2018-03-30

    Sabin-based inactivated poliovirus vaccine(sIPV) is gradually replacing live-attenuated oral polio vaccine(OPV). Sabin-inactivated poliovirus vaccine(sIPV) has played a vital role in reducing economic burden of poliomyelitis and maintaining appropriate antibody levels in the population. However, due to its high cost and limited manufacturing capacity, sIPV cannot reach its full potential for global poliovirus eradication in developing countries. Therefore, to address this situation, we designed this study to evaluate the dose-sparing effects of AS03, CpG oligodeoxynucleotides (CpG-ODN) and polyinosinic:polycytidylic acid (PolyI:C) admixed with sIPV in rats. Our results showed that a combination of 1/4-dose sIPV adjuvanted with AS03 or AS03 with BW006 provides a seroconversion rate similar to that of full-dose sIPV without adjuvant and that, this rate is 5-fold higher than that of 1/4-dose sIPV without adjuvant after the first immunization. The combination of AS03 or AS03 with BW006 as an adjuvant effectively reduced sIPV dose by at least 4-fold and induced both humoral and cellular immune responses. Therefore, our study revealed that the combination of AS03 or AS03 with BW006 is a promising adjuvant for sIPV development.

  3. THE ATTENUATING EFFECT OF EMPOWERMENT ON IPV-RELATED PTSD SYMPTOMS IN BATTERED WOMEN LIVING IN DOMESTIC VIOLENCE SHELTERS

    Science.gov (United States)

    Perez, Sara; Johnson, Dawn M.; Wright, Caroline Vaile

    2010-01-01

    Intimate partner violence (IPV) is associated with significant psychological distress, including posttraumatic stress disorder (PTSD). However, factors that attenuate the impact of IPV on PTSD remain largely unknown. Using hierarchical regression, this investigation explored the impact of resource acquisition and empowerment on the relationship between IPV and PTSD. Empowerment demonstrated greater relative importance over resource acquisition. Specifically, empowerment was found to attenuate the impact of IPV severity on PTSD at low and moderate levels of violence. The importance of fostering empowerment and addressing PTSD in addition to provision of resources in battered women is discussed. PMID:22411301

  4. Desempeño de la calidad del servicio (QoS sobre IPv6

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-06-01

    Full Text Available New applications such as VoIP, e-commerce and video conferencing are sensitive to network performance, making the network capacity to provide quality of service is increasingly important. IPv6 was developed to solve some of the problems of IPv4, such as QoS, security and IP address exhaustion. Current IP networks provide better trafficdelivery effort, therefore, offer no guarantee of quality service. However, there are services, including voice, with stringent requirements for delay and delay variation (jitter, which makes it necessary to add functionality to IP networks based on this protocol are capable of supporting such services. For its part, IPv6 uses 2 fields that can be used to implement QoS, which are: Flow Label and Traffic Class. This article describes the mechanisms and architectures that are used to provide QoS on a network. Later, you specify the features that use both IPv4 and IPv6 to implement QoS. In the last sections present the results of the comparison of 2 scenarios, which are evaluated.

  5. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  6. Is sexual victimization gender specific?

    DEFF Research Database (Denmark)

    Sundaram, Vanita; Laursen, Bjarne; Helweg-Larsen, Karin

    2008-01-01

    The present study investigates the prevalence of sexual victimization and correlations between sexual victimization and indicators of poor health in two representative samples of men and women in Denmark. Specifically, the authors explore the prevalence of self-reported victimization among...... adolescents (N = 5,829) and adults (N = 3,932) and analyze differences in self-reported health outcomes between male and female victims and corresponding controls. Gender differences are found in the reported prevalence of sexual victimization. Significantly more females than males reported forced sexual...... experiences in both samples. Associations between sexual victimization and poor health outcomes are found for both genders. Comparable patterns of association for men and women are found on a number of variables, particularly those pertaining to risk behavior....

  7. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  8. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  9. Children With Disability Are More at Risk of Violence Victimization: Evidence From a Study of School-Aged Chinese Children.

    Science.gov (United States)

    Chan, Ko Ling; Emery, Clifton R; Ip, Patrick

    2016-03-01

    Although research tends to focus on whether children with disability are more at risk of violence victimization, conclusive evidence on the association, especially in non-Western settings, is lacking. Using a large and representative sample of school-aged children in Hong Kong (N = 5,841, aged 9-18 years), this study aims to fill the research gap by providing reliable estimates of the prevalence of disability and the direct and indirect experiences of violence among children with disability. The study also compares the prevalence of child maltreatment, parental intimate partner violence (IPV), and in-law conflict to explore the factors related to the association between disability and violence victimization. The prevalence of disability among children was about 6%. Children with disability were more likely to report victimization than those without disability: 32% to 60% of the former had experienced child maltreatment, and 12% to 46% of them had witnessed IPV between parents or in-law conflict. The results of a logistic regression showed that disability increased the risk of lifetime physical maltreatment by 1.6 times. Furthermore, low levels of parental education and paternal unemployment were risk factors for lifetime child maltreatment. The risk of child maltreatment could have an almost sixfold increase when the child had also witnessed other types of family violence. Possible explanations and implications of the findings are discussed. © The Author(s) 2014.

  10. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  11. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  12. The dilemmas of victim positioning

    Directory of Open Access Journals (Sweden)

    Dorte Marie Søndergaard

    2015-08-01

    Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.

  13. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  14. Cyberbullying victimization in adolescents’ population

    Directory of Open Access Journals (Sweden)

    Nešić Marija

    2016-01-01

    Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.

  15. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    Energy Technology Data Exchange (ETDEWEB)

    Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.

  16. IPV v2.0 : upgrading the established inactivated polio vaccine production process

    NARCIS (Netherlands)

    Thomassen, Y.E.

    2014-01-01

    The first vaccine against poliovirus (PV), the causative agent of poliomyelitis, was developed in the 1950s by Jonas Salk. The vaccine (IPV) consists of an injected dose of purified and inactivated wild-type PVs (all three serotypes). Soon after this discovery, at the Rijks Instituut voor de

  17. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  18. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  19. Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    Directory of Open Access Journals (Sweden)

    Rosli Athirah

    2018-01-01

    Full Text Available The deployment of Internet Protocol version 6 (IPv6 has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6 equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.

  20. Older adults abuse in three Brazilian cities

    OpenAIRE

    Rodrigues, Rosalina Aparecida Partezani; Monteiro, Edilene Araújo; Santos, Ana Maria Ribeiro dos; Pontes, Maria de Lourdes de Farias; Fhon, Jack Roberto Silva; Bolina, Alisson Fernandes; Seredynskyj, Fernanda Laporti; Almeida, Vanessa Costa; Giacomini, Suelen Borelli Lima; Defina, Giovanna Partezani Cardoso; Silva, Luipa Michele

    2017-01-01

    ABSTRACT Objective: To analyze the police reports filed by older adults who suffered abuse in order to identify the socio-demographic characteristics of victims and aggressors, type of violence, location, as well as to compare rates in three Brazilian cities in the period from 2009 to 2013. Method: Ecological study, in which 2,612 police reports registered in Police Stations were analyzed. An instrument was used to obtain data from the victim, the aggressor and the type of violence. Result...

  1. SHE’S NOT A VICTIM! SHE’S MY WIFE! INTIMATE PARTNER VIOLENCE: FUELLED BY DANGEROUS PERPETRATOR ATTITUDES

    Directory of Open Access Journals (Sweden)

    Londt, Marcel

    2014-10-01

    Full Text Available This study used mixed methodology research; chose 53 male and 47 female respondents through purposive sampling, selected intervention research: design and development methodological framework to develop guidelines, used a Canadian Risk Assessment Tool to “assess risk”/“predict dangerousness”. The findings highlighted the need for “risk factor assessment”, showing specific risk factors predicted violence, with sexual violence playing a role. Perpetrators disregard their partners as victims when sexual violence was employed. Qualitative data from female respondents showed that perpetrators use physical assault and sexual violence in their attacks, and their behaviours were fuelled by attitudes that supported/condoned intimate partner violence (IPV.

  2. Rural Australian women's legal help seeking for intimate partner violence: women intimate partner violence victim survivors' perceptions of criminal justice support services.

    Science.gov (United States)

    Ragusa, Angela T

    2013-03-01

    Intimate partner violence (IPV) is a widespread, ongoing, and complex global social problem, whose victims continue to be largely women. Women often prefer to rely on friends and family for IPV help, yet when informal support is unavailable they remain hesitant to contact formal services, particularly legal support for many reasons. This study applies a sociological lens by framing the IPV and legal help-seeking experiences of rural Australian women gained from 36 in-depth face-to-face interviews as socially contextualized interactions. Findings reveal police and court responses reflect broader social inequalities and rurality exacerbates concerns such as anonymity and lack of service. Cultural differences and power imbalances between survivors and formal support providers are manifested to inform future research seeking to improve survivors' willingness to engage and satisfaction with formal services. Finally, the important role police and the criminal justice system play in de-stigmatizing IPV and legitimating its unacceptability is argued a crucial, yet unrecognized, key to social change.

  3. Victims of cyberstalking in Serbia

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina

    2009-01-01

    Full Text Available The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.

  4. Intimate Partner Violence Victimization and Associated Factors ...

    African Journals Online (AJOL)

    AJRH Managing Editor

    Abstract. The study aimed at investigating the prevalence of intimate partner violence (IPV) and its ... in Chile 31% of women and 21 % of men reported ... Protective factors may include lack of ... developed in English, then translated and back-.

  5. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  6. Predicting Rape Victim Empathy Based on Rape Victimization and Acknowledgment Labeling.

    Science.gov (United States)

    Osman, Suzanne L

    2016-06-01

    Two studies examined rape victim empathy based on personal rape victimization and acknowledgment labeling. Female undergraduates (Study 1, n = 267; Study 2, n = 381) from a Northeast U.S. midsize public university completed the Rape-Victim Empathy Scale and Sexual Experiences Survey. As predicted, both studies found that acknowledged "rape" victims reported greater empathy than unacknowledged victims and nonvictims. Unexpectedly, these latter two groups did not differ. Study 1 also found that acknowledged "rape" victims reported greater empathy than victims who acknowledged being "sexually victimized." Findings suggest that being raped and acknowledging "rape" together may facilitate rape victim empathy. © The Author(s) 2015.

  7. Punishment goals of crime victims.

    Science.gov (United States)

    Orth, Uli

    2003-04-01

    Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.

  8. Victimization Experiences and the Stabilization of Victim Sensitivity

    Directory of Open Access Journals (Sweden)

    Mario eGollwitzer

    2015-04-01

    Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.

  9. Promotion of Latina Health: Intersectionality of IPV and Risk for HIV/AIDS.

    Science.gov (United States)

    Rountree, Michele A; Granillo, Teresa; Bagwell-Gray, Meredith

    2016-04-01

    Latina women in the United States are vulnerable to two intersecting public health concerns: intimate partner violence (IPV) and subsequent risk for HIV/AIDS infection. Examination of the cultural and contextual life factors of this understudied population is crucial to developing culturally relevant HIV interventions. Focus groups with Latinas (15 monolingual; 10 bilingual) who have experienced IPV were conducted. Monolingual and bilingual Latinas endorsed that they were concerned about HIV infection, naming partner infidelity and experiences of forced and coerced sex as primary reasons for their concern. However, monolingual participants had lower levels of HIV knowledge, spending much time discussing myths of HIV infection, whereas bilingual participants spent more time discussing specific prevention techniques, including challenges related to the violence in their relationships. These findings suggest that HIV/AIDS prevention programs for Latinas need to pay close attention to the different historical, contextual, and cultural experiences of this at-risk group of women. © The Author(s) 2015.

  10. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  11. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  12. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  13. Enhancing assessment of interpersonal violence (IPV) pregnancy-related homicide risk within nursing curricula.

    Science.gov (United States)

    Clements, Paul Thomas; Holt, Karyn E; Hasson, Catherine M; Fay-Hillier, Theresa

    2011-12-01

    Pregnancy and motherhood traditionally represent evolution of the next generation; yet, contemporary research and analyses confirm that this time can also be manifested in fear by the expectant mother within an environment of battering, cruelty, physical and emotional abuse, and sexual assault. Often to the surprise of many healthcare providers, the Centers for Disease Control and Prevention have consistently reported that Interpersonal Violence (IPV) related homicide is a leading cause of traumatic death among new and expectant mothers. In spite of these staggering statistical and anecdotal findings, universal screening for violence during pregnancy continues to be minimal. Forensic nurses might be prompted to respond to the consequences of violence and its resultant negative effects on expectant mothers by strategically incorporating systematic and consistent assessment into foundational nursing curricula regarding IPV as a leading risk factor for injury or death. © 2011 International Association of Forensic Nurses.

  14. Abuse Is Abuse: The Influence of Type of Abuse, Victim Age, and Defendant Age on Juror Decision Making.

    Science.gov (United States)

    Sheahan, Chelsea L; Pica, Emily; Pozzulo, Joanna D

    2017-09-01

    The purpose of the current study was to examine the role of victim age, defendant age, and type of abuse on mock juror decision making. Mock jurors ( N = 556) read a trial transcript in which a soccer coach was accused of sexual abuse or physical abuse against a player. The victim's age (child, adolescent, or young adult), the defendant's age (young, middle age, or older adult), and the type of abuse (sexual or physical) were varied. Mock jurors provided a dichotomous and continuous verdict and rated their perceptions of the victim and the defendant. Although no differences on mock jurors' dichotomous verdict were found due to victim age, defendant age, or type of abuse, mock jurors provided higher guilt ratings when the abuse was sexual and both the victim and defendant were described as young adults. Similarly, mock jurors rated the victim more positively when the victim was described as a young adult (vs. child) for both sexual and physical abuse cases, and rated the defendant more positively when the victim was described as a child compared with young adult in sexual abuse cases. These findings suggest that mock jurors were largely influenced by victim age, particularly when the victim was described as an adult compared with a child.

  15. Environmental Dysfunctions, Childhood Maltreatment and Women's Intimate Partner Violence Victimization.

    Science.gov (United States)

    Cascio, Maria Lo; Guarnaccia, Cinzia; Infurna, Maria Rita; Mancuso, Laura; Parroco, Anna Maria; Giannone, Francesca

    2017-06-01

    Childhood maltreatment is considered a crucial explanatory variable for intimate partner violence (IPV) in adulthood. However, a developmental multifactorial model for the etiology of IPV is not shared by researchers yet. This study has investigated the role of a wide range of childhood maltreatments and family and social dysfunctions in predicting IPV; furthermore, it tests a model where childhood maltreatment mediates the relationship between environmental dysfunctions and IPV. The sample included 78 women: IPV (38) and non-IPV (40). The Italian version of the Childhood Experience of Care and Abuse (CECA) Interview was used to assess the presence of adverse childhood experiences. The Revised Conflict Tactics Scale (CTS-2) and the IPV History Interview were used to assess IPV in the last year and lifetime, respectively. The results of a multivariate logistic regression model have indicated that only sexual (odds ratio [OR] = 4.24) and psychological (OR = 3.45) abuse significantly predicted IPV; with regard to association between IPV and environmental dysfunctions, only poor social support (OR = 8.91) significantly predicted IPV. The results of a mediation model have shown that childhood psychological and sexual abuse, in association with each other, partially mediate the relationship between poor social support and IPV. The findings from this study pinpoint poor social support as an important predictor of IPV so far neglected in the literature on the developmental antecedents of IPV. They also support the theoretical assumption according to which dysfunctional environmental variables and types of childhood maltreatment interacting with each other may influence development outcomes.

  16. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV)

    Science.gov (United States)

    Machisa, Mercilene T.; Christofides, Nicola; Jewkes, Rachel

    2016-01-01

    Background Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV). The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health. Methods We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM) to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms) mediates the relationship between child abuse and IPV perpetration. Results Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective

  17. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV.

    Directory of Open Access Journals (Sweden)

    Mercilene T Machisa

    Full Text Available Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV. The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health.We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms mediates the relationship between child abuse and IPV perpetration.Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective against single and

  18. A DTAP–IPV//PRP~T VACCINE: A REVIEW OF 16 YEARS’ CLINICAL EXPERIENCE

    Directory of Open Access Journals (Sweden)

    Stanley A. Plotkin

    2012-01-01

    Full Text Available Owing to their low reactogenicity, confirmed efficacy and availability in combination vaccines, acellular pertussis (aP-inactivated poliovirus (IPV combined vaccines are now included in various national immunization programs worldwide. We provide an overview of 16 years of clinical experience with a diphtheria (D, tetanus (T, aP, IPV and Haemophilus influenzae type b (Hib polysaccharide conjugated to tetanus protein (PRP~T combined vaccine (DTaP–IPV//PRP~T — Pentaxim, Sanofi Pasteur, France. Good immunogenicity has been demonstrated after primary vaccination with Pentaxim, regardless of the population ethnicity and primary vaccination schedule. A booster vaccination in the second year of life also resulted in a high immune response for each antigen. Furthermore, 10 years of national surveillance in Sweden has demonstrated the effectiveness of Pentaxim in controlling pertussis. As is the case for other aP-containing combined vaccines, Pentaxim is well tolerated, with the safety profile being better than for whole-cell pertussiscontaining combination vaccines for primary and booster vaccinations.

  19. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  20. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  1. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  2. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  3. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    Science.gov (United States)

    Stephenson, Rob; Finneran, Catherine

    2013-01-01

    The paper describes the creation of a new scale to measure intimate partner violence (IPV) among gay and bisexual men. Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S). Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence. A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90). The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures. The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  4. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    Directory of Open Access Journals (Sweden)

    Rob Stephenson

    Full Text Available The paper describes the creation of a new scale to measure intimate partner violence (IPV among gay and bisexual men.Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S. Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence.A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90. The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures.The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  5. Cyber-Dependent Crime Victimization: The Same Risk for Everyone?

    Science.gov (United States)

    Bergmann, Marie Christine; Dreißigacker, Arne; von Skarczinski, Bennet; Wollinger, Gina Rosa

    2018-02-01

    The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors. Our analyses were based on a random sample of 26,665 Internet users in two federal states in Germany, aged 16 years and older; 16.6 percent of the respondents had experienced at least one form of cyber-dependent victimization during the year 2014. The results indicate that individual and household factors, as well as online and prevention behavior, influence the risk of cyber-dependent victimization. Furthermore, the effects differ between the three types of offences. In conclusion, the risk of being victimized by cyber-dependent crime is not the same for anyone, but depends on multivariate factors according to the idea of Routine Activity Approach. However, in view of the fact that crime-related factors also matter, studying different cybercrime offences separately seems to be an appropriate research approach.

  6. Justice And Legal Certainty For Child Victims

    Directory of Open Access Journals (Sweden)

    Edi Setiadi

    2016-12-01

    Full Text Available Focus of attention in the criminal justice system so far has always been to the perpetrator, whereas parties related to a process of criminal justice encompasses the perpetrator, the victim, and the community. A crime victim, in particular, would suffer more since he/she could experience secondary victimization in the criminal justice system. The law concerning victim and witness protection only states the limitation for the criminal victim to ask for compensation to criminal justice system, either as a victim of direct criminal or a victim of abuse power done by law enforcement officers. Child victims are treated the same way as to adult victims, whilst they have a greater dimension of the problem and effects to be dealt with Mechanism and procedures to be followed are ius constituendum (intended/desirable law, as they only share expectation of indemnity, compensation, and rehabilitation which have not been empirically tested in a real situation.

  7. Exploring the Characteristics of Personal Victims Using the National Crime Victimization Survey

    National Research Council Canada - National Science Library

    Jairam, Shashi

    1998-01-01

    .... Two statistical methods were used to investigate these hypotheses, logistical regression for victimization prevalence, and negative binomial regression for victimization incidence and concentration...

  8. Bullying and Victimization Among Children

    Science.gov (United States)

    Shetgiri, Rashmi

    2013-01-01

    Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839

  9. Sexual Homicide by Older Male Offenders.

    Science.gov (United States)

    Myers, Wade C; Chan, Heng Choon Oliver; Mariano, Timothy Y; Safarik, Mark E; Geberth, Vernon J

    2017-07-01

    Recent research has expanded our understanding of sexual homicide offenders (SHOs). However, little exists beyond case reports for older SHOs. We characterized male SHOs ≥ 55 years, comparing them to typical adult male SHOs who are in their 20s. Analysis of 37 years (1976-2012) of US Supplementary Homicide Reports data provided a large SHO sample (N = 3453). Three case reports provide clinical context for the diverse nature and patterns of older SHOs. Only 32 older male SHOs and no older female SHOs were identified. Murders by older SHOs accounted for only 0.5% of US sexual homicides. Unlike typical SHOs that generally target young adult females, over two-thirds of older SHO victims were ≥40 years, and one-third were ≥55 years. Sexual homicides by older SHOs, like sexual homicide in general, decreased over the study period. These crimes, while exceedingly rare, do occur, warranting special consideration. © 2017 American Academy of Forensic Sciences.

  10. Domestic violence and mental health in older adults.

    Science.gov (United States)

    Knight, Lucy; Hester, Marianne

    2016-10-01

    Domestic violence affects every age group and is present throughout the life span, but, while the mental health impact of domestic violence is clearly established in working age adults, less is known about the nature and impact of domestic violence among older adults. This review, therefore, aimed to synthesize findings on the prevalence, nature, and impact of domestic violence among older adults, and its identification and management. Electronic searches were conducted of Medline, PsycINFO, Cinahl, and Embase to identify studies reporting on the mental health and domestic violence in older adults. Findings suggested that, although prevalence figures are variable, the likely lifetime prevalence for women over the age of 65 is between 20-30%. Physical abuse is suggested to decrease with age, but rates of emotional abuse appear to be stable over the lifespan. Among older adults, domestic violence is strongly associated with physical and mental health problems, and the scarce research comparing the impact of domestic violence across the age cohorts suggests that the physical health of older victims may be more severely affected than younger victims. In contrast, there is evidence that older victims may experience less psychological distress in response to domestic violence than younger victims. Internationally, evidence on the management of domestic violence in older adults is sparse. Findings suggest, however, that identification of domestic violence is poor among older adults, and there are very limited options for onwards referral and support.

  11. Victims of cybercrime in Europe : a review of victim surveys

    NARCIS (Netherlands)

    Reep-van den Bergh, Carin M.M.; Junger, Marianne

    2018-01-01

    Objectives: Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods: We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected

  12. The effects of exposure to violence and victimization across life domains on adolescent substance use.

    Science.gov (United States)

    Wright, Emily M; Fagan, Abigail A; Pinchevsky, Gillian M

    2013-11-01

    This study uses longitudinal data from the Project on Human Development in Chicago Neighborhoods (PHDCN) to examine the effects of exposure to school violence, community violence, child abuse, and parental intimate partner violence (IPV) on youths' subsequent alcohol and marijuana use. We also examine the cumulative effects of being exposed to violence across these domains. Longitudinal data were obtained from 1,655 adolescents and their primary caregivers participating in the PHDCN. The effects of adolescents' exposure to various forms of violence across different life domains were examined relative to adolescents' frequency of alcohol and marijuana use three years later. Multivariate statistical models were employed to control for a range of child, parent, and family risk factors. Exposure to violence in a one-year period increased the frequency of substance use three years later, though the specific relationships between victimization and use varied for alcohol and marijuana use. Community violence and child abuse, but not school violence or exposure to IPV, were predictive of future marijuana use. None of the independent measures of exposure to violence significantly predicted future alcohol use. Finally, the accumulation of exposure to violence across life domains was detrimental to both future alcohol and marijuana use. The findings support prior research indicating that exposure to multiple forms of violence, across multiple domains of life, negatively impacts adolescent outcomes, including substance use. The findings also suggest that the context in which exposure to violence occurs should be considered in future research, since the more domains in which youth are exposed to violence, the fewer "safe havens" they have available. Finally, a better understanding of the types of violence youth encounter and the contexts in which these experiences occur can help inform intervention efforts aimed at reducing victimization and its negative consequences. Copyright

  13. Validation test of advanced technology for IPV nickel-hydrogen flight cells: Update

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the low-earth-orbit (LEO) cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. An advanced 125 Ah IPV nickel-hydrogen cell was designed. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion. The advanced cell design is in the process of being validated using real time LEO cycle life testing of NWSC, Crane, Indiana. An update of validation test results confirming this technology is presented.

  14. Responding to Children Victimized by Their Peers

    Science.gov (United States)

    Nickerson, Amanda B.; Brock, Stephen E.; Chang, Yiping; O'Malley, Meagan D.

    2006-01-01

    Because victimization results from the dynamic interplay between the victim and his or her parents, peers, and teachers, responding to this problem should involve both direct and indirect interventions. This paper describes and reviews empirically supported direct interventions with victims, as well as indirect interventions with parents, peers,…

  15. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  16. Sexual victimization, partner aggression and alcohol consumption ...

    African Journals Online (AJOL)

    This paper examines the relationship sexual victimization (both childhood sexual victimization and adult sexual victimization), aggression and alcohol consumption. The data for this research is from the Gender, Alcohol and Culture: an International Study (GENACIS). A random sample of 2070 adults (53.8% males and ...

  17. Prevention of victimization following sexual assaults

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria; Sidenius, Katrine

    2004-01-01

    Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...... of women exposed to sexualized coercion and the diversity of perspectives on the events....

  18. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  19. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  20. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  1. Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2012-01-01

    Full Text Available The Internet of Things (IoT requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offered by the IPv6 addressing and core network. Glowbal IP's main advantages with regard to 6LoWPAN/IPv6 are not only that it presents a low overhead to reach a higher performance on a regular basis, but also that it determines the session and identifies global access by means of a session layer defined over the application layer. Technologies without any native support for IP are thereby adaptable to IP e.g. IEEE 802.15.4 and Bluetooth Low Energy. This extension towards the IPv6 network opens access to the features and methods of the devices through a homogenous access based on WebServices (e.g. RESTFul/CoAP. In addition to this, Glowbal IP offers global interoperability among the different devices, and interoperability with external servers and users applications. All in all, it allows the storage of information related to the devices in the network through the extension of the Domain Name System (DNS from the IPv6 core network, by adding the Service Directory extension (DNS-SD to store information about the sensors, their properties and functionality. A step forward in network-based information systems is thereby reached, allowing a homogenous discovery, and access to the devices from the IoT. Thus, the IoT capabilities are exploited by allowing an easier and more transparent integration of the end users applications with sensors for the future evaluations and

  2. How do primary health care teams learn to integrate intimate partner violence (IPV) management? A realist evaluation protocol.

    Science.gov (United States)

    Goicolea, Isabel; Vives-Cases, Carmen; San Sebastian, Miguel; Marchal, Bruno; Kegels, Guy; Hurtig, Anna-Karin

    2013-03-23

    Despite the existence of ample literature dealing, on the one hand, with the integration of innovations within health systems and team learning, and, on the other hand, with different aspects of the detection and management of intimate partner violence (IPV) within healthcare facilities, research that explores how health innovations that go beyond biomedical issues-such as IPV management-get integrated into health systems, and that focuses on healthcare teams' learning processes is, to the best of our knowledge, very scarce if not absent. This realist evaluation protocol aims to ascertain: why, how, and under what circumstances primary healthcare teams engage (if at all) in a learning process to integrate IPV management in their practices; and why, how, and under what circumstances team learning processes lead to the development of organizational culture and values regarding IPV management, and the delivery of IPV management services. This study will be conducted in Spain using a multiple-case study design. Data will be collected from selected cases (primary healthcare teams) through different methods: individual and group interviews, routinely collected statistical data, documentary review, and observation. Cases will be purposively selected in order to enable testing the initial middle-range theory (MRT). After in-depth exploration of a limited number of cases, additional cases will be chosen for their ability to contribute to refining the emerging MRT to explain how primary healthcare learn to integrate intimate partner violence management. Evaluations of health sector responses to IPV are scarce, and even fewer focus on why, how, and when the healthcare services integrate IPV management. There is a consensus that healthcare professionals and healthcare teams play a key role in this integration, and that training is important in order to realize changes. However, little is known about team learning of IPV management, both in terms of how to trigger such learning

  3. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  4. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Directory of Open Access Journals (Sweden)

    Peer Azmat Shah

    2014-01-01

    Full Text Available Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP, video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO, for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2 and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO.

  5. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  6. Microfinance Participation, Control Over Resources, and Justification of IPV: Results From a Nationally Representative Sample of Women.

    Science.gov (United States)

    Murshid, Nadine Shaanta

    2016-04-13

    A high percentage of men and women are purported to justify intimate partner violence (IPV) in countries that are steeped in patriarchy even in the presence of programs such as microfinance that aim to address gender equity. This article examines two assertions that emerge from the literature on microfinance and its potential for positive outcomes for women who participate in it: (a) Microfinance participation is associated with reduced justification of IPV, and (b) microfinance participants with control over their own resources are less likely to justify IPV when compared with microfinance participants who do not have control over their resources. Couples data from a nationally representative survey, the Bangladesh Demographic and Health Survey, were used in the present study. Propensity score matching and logistic regression analyses were conducted to reveal that (a) microfinance participation was not associated with justification of IPV and that (b) women who participated in microfinance were less likely to justify IPV when they had no control over their resources. Implications for practitioners and policymakers are discussed. © The Author(s) 2016.

  7. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    Science.gov (United States)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  8. Victimization Experiences and Adolescent Substance Use: Does the Type and Degree of Victimization Matter?

    OpenAIRE

    Pinchevsky, Gillian M.; Fagan, Abigail A.; Wright, Emily M.

    2013-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only asses...

  9. Victimization experiences and adolescent substance use: does the type and degree of victimization matter?

    Science.gov (United States)

    Pinchevsky, Gillian M; Fagan, Abigail A; Wright, Emily M

    2014-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only assess these relationships in the short-term using cross-sectional data. This study uses data from the Project on Human Development in Chicago Neighborhoods (PHDCN) to explore the impact of experiencing only indirect victimization, only direct victimization, both forms of victimization, and no victimization on substance use at two time points during adolescence. We find that of those adolescents who are victimized, the majority experience indirect victimization only, followed by experiencing both forms of victimization, and experiencing direct victimization only. Each of the victimization experiences were associated with increased contemporaneous substance use, with the strongest effects for those experiencing multiple forms of violence. For all victims, however, the impact on substance use declined over time.

  10. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet

  11. Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble

    Directory of Open Access Journals (Sweden)

    Danilo López

    2012-06-01

    Full Text Available The tunneling techniques have been widely used to interconnect IPv6 islands over native MPLS Core Infrastructure IPv4. However, due to limited scalability, it is usual to adopt other strategies as 6PE or 6VPE interconnection, which are much more complex to implement. This article proposes and implements level simulation using GNS3+Dynamips, a solution that makes use of tunneling techniques in the PE (Provider Edge (type double-stack of the network, reducing the drawbacks of the mesh scalability own tunnels on routers CE (Customer Edge and without the complexity and requirements regarding proper equipment and solutions 6VPE 6PE.

  12. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  13. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    International Nuclear Information System (INIS)

    Anwar, Farhat; Masud, Mosharrof H; Latif, Suhaimi A

    2013-01-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6

  14. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  15. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  16. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  17. Re-experiencing Violence across the Life Course: Histories of Childhood Maltreatment and Elder Abuse Victimization.

    Science.gov (United States)

    Kong, Jooyoung; Easton, Scott D

    2018-03-26

    This study primarily examines the associations between histories of childhood maltreatment (i.e., neglect, emotional, physical, and sexual abuse) and elder abuse victimization and explores whether gender moderates the associations. We conducted a secondary data analysis of 5,968 older adults (mean age = 71 years) based on data from the Wisconsin Longitudinal Study (2010-2011). Using retrospective self-reports of childhood and current (past 12 months) victimization experiences, logistic regression analyses were conducted to estimate the effects of early-life adversities on the likelihood of elder abuse victimization. Results indicate that childhood emotional abuse and childhood sexual abuse were associated with greater risk of being abused as older adults, after controlling for childhood and adult background factors. We also found that the effect of childhood sexual abuse on elder abuse victimization was weaker for women than men. Findings suggest that the phenomenon of revictimization may occur not only in early and middle adulthood, but also in late life. To advance our understanding of victimization across the life course, future research on root causes of elder abuse should include histories of child abuse.

  18. Imaging findings of avalanche victims

    Energy Technology Data Exchange (ETDEWEB)

    Grosse, Alexandra B.; Grosse, Claudia A.; Anderson, Suzanne [University Hospital of Berne, Inselspital, Department of Diagnostic, Pediatric and Interventional Radiology, Berne (Switzerland); Steinbach, Lynne S. [University of California San Francisco, Department of Radiology, San Francisco, CA (United States); Zimmermann, Heinz [University Hospital of Berne, Inselspital, Department of Trauma and Emergency Medicine, Berne (Switzerland)

    2007-06-15

    Skiing and hiking outside the boundaries remains an attractive wilderness activity despite the danger of avalanches. Avalanches occur on a relatively frequent basis and may be devastating. Musculoskeletal radiologists should be acquainted with these injuries. Fourteen avalanche victims (11 men and 3 women; age range 17-59 years, mean age 37.4 years) were air transported to a high-grade trauma centre over a period of 2 years. Radiographs, CT and MR images were prospectively evaluated by two observers in consensus. Musculoskeletal findings (61%) were more frequent than extraskeletal findings (39%). Fractures were most commonly seen (36.6%), involving the spine (14.6%) more frequently than the extremities (9.8%). Blunt abdominal and thoracic trauma were the most frequent extraskeletal findings. A wide spectrum of injuries can be found in avalanche victims, ranging from extremity fractures to massive polytrauma. Asphyxia remains the main cause of death along with hypoxic brain injury and hypothermia. (orig.)

  19. The dilemmas of victim positioning

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    2015-01-01

    Based on a conceptualization of bullying and relational aggression in groups as an effect of social dynamics rather than individual deficits – this article reflects upon some of the intricate mechanisms and dilemmas involved in victim positioning. Victims of bullying and relational aggression often....... The hopes of (eventual) social belonging may in that sense work paradoxically as a strong agent in the denial of oppression and marginalization. The article is theoretically informed by poststructuralist conceptualizations and grounded in cases of bullying and marginalization (one of them involving rape......). One case is taken from the empirical data produced by the author and a research project on bullying among children (eXbus: Exploring Bullying in School). Two other cases are borrowed from publications of respectively B. Davies from Australia and A. Evaldsson from Shweden. The article opens insights...

  20. Dynamic profiles of neutralizing antibody responses elicited in rhesus monkeys immunized with a combined tetravalent DTaP-Sabin IPV candidate vaccine.

    Science.gov (United States)

    Sun, Mingbo; Ma, Yan; Xu, Yinhua; Yang, Huijuan; Shi, Li; Che, Yanchun; Liao, Guoyang; Jiang, Shude; Zhang, Shumin; Li, Qihan

    2014-02-19

    The World Health Organization has recommended that a Sabin inactivated polio vaccine (IPV) should gradually and synchronously replace oral polio vaccines for routine immunizations because its benefits in eliminating vaccine-associated paralytic poliomyelitis have been reported in different phases of clinical trials. It is also considered important to explore new tetravalent diphtheria, tetanus, and acellular pertussis-Sabin IPV (DTaP-sIPV) candidate vaccines for possible use in developing countries. In this study, the immunogenicity of a combined tetravalent DTaP-sIPV candidate vaccine was investigated in primates by evaluating the neutralizing antibody responses it induced. The dynamic profiles of the antibody responses to each of the separate antigenic components and serotypes of Sabin IPV were determined and their corresponding geometric mean titers were similar to those generated by the tetravalent diphtheria, tetanus, and acellular pertussis-conventional IPV (DTaP-cIPV), the tetravalent diphtheria, tetanus, and acellular pertussis (DTaP), and Sabin IPV vaccines in the control groups. This implies that protective immunogenic effects are conferred by this combined tetravalent formulation. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Big Five Personality Traits of Cybercrime Victims.

    Science.gov (United States)

    van de Weijer, Steve G A; Leukfeldt, E Rutger

    2017-07-01

    The prevalence of cybercrime has increased rapidly over the last decades and has become part of the everyday life of citizens. It is, therefore, of great importance to gain more knowledge on the factors related to an increased or decreased likelihood of becoming a cybercrime victim. The current study adds to the existing body of knowledge using a large representative sample of Dutch individuals (N = 3,648) to study the relationship between cybercrime victimization and the key traits from the Big Five model of personality (i.e., extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience). First, multinomial logistic regression analyses were used to examine the associations between the personality traits and three victim groups, that is, cybercrime victims versus nonvictims, traditional crime victims versus nonvictims, and cybercrime victims versus traditional crime victims. Next, logistic regression analyses were performed to predict victimization of cyber-dependent crimes (i.e., hacking and virus infection) and cyber-enabled crimes (i.e., online intimidation, online consumer fraud, and theft from bank account). The analyses show that personality traits are not specifically associated with cybercrime victimization, but rather with victimization in general. Only those with higher scores on emotional stability were less likely to become a victim of cybercrime than traditional crime. Furthermore, the results indicate that there are little differences between personality traits related to victimization of cyber-enabled and cyber-dependent crimes. Only individuals with higher scores on openness to experience have higher odds of becoming a victim of cyber-enabled crimes.

  2. Bullying Victimization Among Chinese Middle School Students: The Role of Family Violence.

    Science.gov (United States)

    Zhu, Yuhong; Chan, Ko Ling; Chen, Jinsong

    2018-06-01

    This study used the data from a representative sample to investigate the association between family violence (FV) and child bullying victimization (BV) in Xi'an city, China. Data on social demographic information and the prevalence of BV and FV were collected from a randomly selected sample with 3,175 middle school students aged 15 to 17 by self-administrated questionnaires. Results show that 55.9% and 30.3% of the participants have witnessed intimate partner violence (IPV), 37.7% and 30.8% have been victims of child abuse, and 54.9% and 44.6% have been bullied in a lifetime and in the preceding year, respectively. The lifetime and preceding-year co-occurrence rate of FV and BV are 45% and 30.4%, respectively. Multiple logistic regressions confirm FV as a unique risk factor in predicting both direct and relational BV after controlling for a number of confounding factors. This study suggests that FV experiences should be included in the screening and assessment of risk for child BV.

  3. Mean ages of homicide victims and victims of homicide-suicide.

    Science.gov (United States)

    Bridges, F Stephen; Tankersley, William B

    2010-02-01

    Using Riedel and Zahn's 1994 reformatted version of an FBI database, the mean age of homicide victims in 2,175 homicide-suicides (4,350 deaths) was compared with that of all other victims of homicides reported for the USA from 1968 to 1975. The overall mean age of homicide victims in homicide-suicides was 1 yr. greater than for victims of homicides not followed by suicides, whereas the mean age for both male and female homicide-suicide victims was, respectively, 3 yr. less and greater than the other homicide victims. The mean age of Black homicide victims of homicide-suicides was 2.4 yr. less than that for Black victims of other homicides, whereas the means for Black and White male homicide victims in homicide-suicides were, respectively, about 4 and 5 yr. less than for victims of other homicides. Also, the mean age of White female homicide victims in homicide-suicides was more than two years greater than for female victims of homicides not followed by suicides. When both sex and race were considered, the mean age for those killed in homicide-suicides relative to those killed in homicides not followed by suicides may represent subpopulations with different mean ages of victims.

  4. The rarity of "unusual" [corrected] dispositions of victim bodies: staging and posing.

    Science.gov (United States)

    Keppel, Robert D; Weis, Joseph G

    2004-11-01

    The act of leaving a victim's body in an unusual position is a conscious criminal action by an offender to thwart an investigation, shock the finder and investigators of the crime scene, or give perverted pleasure to the killer. The unusual position concepts of posing and staging a murder victim have been documented thoroughly and have been accepted by the courts as a definable phenomenon. One staging case and one posing case are outlined and reveal characteristics of those homicides. From the Washington State Attorney General's Homicide Investigation and Tracking System's database on murder covering the years 1981-2000 (a total of 5,224 cases), the relative frequency of unusual body dispositions is revealed as a very rare occurrence. Only 1.3% of victims are left in an unusual position, with 0.3% being posed and 0.1% being staged. The characteristics of these types of murders also set them apart: compared to all other murders, in staged murders the victims and killers are, on average, older. All victims and offenders in the staged murders are white, with victims being disproportionately white in murders with any kind of unusual body disposition. Likewise, females stand out as victims when the body is posed, staged, or left in other unusual positions. Whereas posed bodies are more likely to include sexual assault, often in serial murders, there is no evidence of either in the staged cases. Lastly, when a body is left in an unusual position, binding is more likely, as well as the use of more "hands on" means of killing the victim, such as stabbing or cutting weapons, bludgeons, ligatures, or hands and feet.

  5. Victim's Rights - Comparative Approach within EU Legislation

    Directory of Open Access Journals (Sweden)

    Monica Pocora

    2015-12-01

    Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.

  6. Concomitant administration of diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) with pentavalent rotavirus vaccine in Japanese infants.

    Science.gov (United States)

    Tanaka, Yoshiyuki; Yokokawa, Ruriko; Rong, Han Shi; Kishino, Hiroyuki; Stek, Jon E; Nelson, Margaret; Lawrence, Jody

    2017-06-03

    Rotavirus is the leading cause of severe acute gastroenteritis in infants and young children. Most children are infected with rotavirus, and the health and economic burdens of rotavirus gastroenteritis on healthcare systems and families are considerable. In 2012 pentavalent rotavirus vaccine (RV5) and diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) were licensed in Japan. We examined the immunogenicity and safety of DTaP-sIPV when administrated concomitantly with RV5 in Japanese infants. A total of 192 infants 6 to 11 weeks of age randomized to Group 1 (N = 96) received DTaP-sIPV and RV5 concomitantly, and Group 2 (N = 96) received DTaP-sIPV and RV5 separately. Antibody titer to diphtheria toxin, pertussis antigens (PT and FHA), tetanus toxin, and poliovirus type 1, 2, and 3 were measured at 4 to 6 weeks following 3-doses of DTaP-sIPV. Seroprotection rates for all components of DTaP-sIPV were 100% in both groups, and the geometric mean titers for DTaP-sIPV in Group 1 were comparable to Group 2. Incidence of systemic AEs (including diarrhea, vomiting, fever, and nasopharyngitis) were lower in Group 1 than in Group 2. All vaccine-related AEs were mild or moderate in intensity. There were no vaccine-related serious AEs, no deaths, and no cases of intussusception during the study. Concomitant administration of DTaP-sIPV and RV5 induced satisfactory immune responses to DTaP-sIPV and acceptable safety profile. The administration of DTaP-sIPV given concomitantly with RV5 is expected to facilitate compliance with the vaccination schedule and improve vaccine coverage in Japanese infants.

  7. Protection Orders Protect Against Assault and Injury: A Longitudinal Study of Police-Involved Women Victims of Intimate Partner Violence

    Science.gov (United States)

    Kothari, Catherine L.; Rhodes, Karin V.; Wiley, James A.; Fink, Jeffrey; Overholt, Scott; Dichter, Melissa E.; Marcus, Steven C.; Cerulli, Catherine

    2014-01-01

    Objective To measure the efficacy of protection orders (POs) in reducing assault and injury-related outcomes using a matched comparison group and tracking outcomes over time. Methods This study was a retrospective review of police, emergency department, family court and prosecutor administrative records for a cohort of police-involved female IPV victims; all events over a four-year study period were abstracted. Victims who obtained protection orders (POs) were compared to a propensity-score-based match group without POs over three time periods: Before, during, and after the issuance of a PO. Results Having a PO in place was associated with significantly more calls to police for non-assaultive incidents, and more police charging requests that were multiple-count and felony-level. Comparing outcomes, PO victims had police incident rates that were more than double the matched group prior to the PO, but dropped to the level of the matched group during and after the order. ED visits dropped over time for both groups. Conclusion This study confirmed the protective effect of POs, which are associated with reduced police incidents and emergency department visits both during and after the order, and reduced police incidents compared to a matched comparison group. PMID:22491224

  8. Movilidad en IPV6: simulación con Network Simulator

    Directory of Open Access Journals (Sweden)

    Javier Eduardo Carvajal Escobar

    2013-07-01

    Full Text Available IP Móvil es la propuesta de Internet Engineering Task Force (IETF para el protocolo de movilidad llamado MIPv6. Este protocolo se ha convertido en la columna vertebral de las nuevas tecnologías de redes inalámbricas mediante las cuales se busca proveer de un servicio ininterrumpido mientras se está en movimiento. Este artículo presenta una visión general del funcionamiento de dicho protocolo, los términos relacionados con este y los nuevos ensajes que vienen dentro del encabezado de movilidad en IPv6. Después se realiza una simulación de dicho protocolo con el software Network Simulator 2, bajo licencia GNU de distribución libre. Como resultado de la simulación se obtiene un archivo de trazas en el cual se plasman todos los eventos.

  9. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  10. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  11. Diseño e implementación de IPv6 en un sistema embebido

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2013-09-01

    Full Text Available This paper presents a procedure for the implementation of new-generation protocols in an embedded system. The aim is to show that such an implementation can be connected to the Internet via IPv6. This, for its part, reveals some necessary aspects for supporting the procedure and for actual implementation of a web server (as proof of successful operation. A microcontroller that allows the use of Ethernet (FreescaleColdfire V1 was selected to facilitate handling FreeRTOS and the uIP protocol stack. We found it necessary to write an additional algorithm for the management of the link layer. Since there is no established standard or methodology for these developments in different microcontrollers, characterization must be achieved depending on the particular hardware being used, including certain files that ensure the performance of each of the layers regarding the protocol stack in question.

  12. How to become a victim of crime

    OpenAIRE

    Богдан Миколайович Головкін

    2017-01-01

    Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1) the emergence of criminal threats; 2) increasing the degree of social vulnerability to criminal assault; 3) the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations); 4) increase the number of victims of crimes as regis...

  13. Victimization, polyvictimization , and health in Swedish adolescents

    Directory of Open Access Journals (Sweden)

    Aho N

    2016-08-01

    Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC

  14. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  15. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight battery cells

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1990-01-01

    A breakthrough in the low-earth-orbit (LEO) cycle life of individual pressure vessel (IPV) nickel hydrogen battery cells is reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. The effect of KOH concentration on cycle life was studied. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min charge (2 x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The next step is to validate these results using flight hardware and real time LEO test. NASA Lewis has a contract with the Naval Weapons Support Center (NWSC), Crane, Indiana to validate the boiler plate test results. Six 48 A-hr Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells) and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The cells were cycled for over 8000 cycles in the continuing test. There were no failures for the cells containing 26 percent KOH. There were two failures, however, for the cells containing 31 percent KOH.

  16. Validation test of advanced technology for IPV nickel-hydrogen flight cells - Update

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the LEO cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion.

  17. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  18. Bullies and Victims: A Phenomenological Study

    Science.gov (United States)

    Omizo, Michael M.; Omizo, Sharon A.; Baxa, Gari-Vic C. O.; Miyose, Ross J.

    2006-01-01

    This study presents the results of a phenomenological study with sixteen elementary school children identified as bullies or victims. Implications for school counselors and educators are also discussed.

  19. The victim of the nuclear accident

    International Nuclear Information System (INIS)

    Carvalho, A.B. de.

    1990-01-01

    This paper shows the effects of the nuclear accident in the victims, in their lives, changes in the behaviour, neurosis including all the psychological aspects. The author compare the victims with nuclear accident like AIDS patients, in terms of people's discrimination. There is another kind of victims. They are the people who gave helpness, for example physicians, firemen and everybody involved with the first aids that suffer together with the victims trying to safe them and to diminish their suffering, combating the danger, the discrimination and the no information. (L.M.J.)

  20. Identifying bully victims: definitional versus behavioral approaches.

    Science.gov (United States)

    Green, Jennifer Greif; Felix, Erika D; Sharkey, Jill D; Furlong, Michael J; Kras, Jennifer E

    2013-06-01

    Schools frequently assess bullying and the Olweus Bully/Victimization Questionnaire (BVQ; Olweus, 1996) is the most widely adopted tool for this purpose. The BVQ is a self-report survey that uses a definitional measurement method--describing "bullying" as involving repeated, intentional aggression in a relationship where there is an imbalance of power and then asking respondents to indicate how frequently they experienced this type of victimization. Few studies have examined BVQ validity and whether this definitional method truly identifies the repetition and power differential that distinguish bullying from other forms of peer victimization. This study examined the concurrent validity of the BVQ definitional question among 435 students reporting peer victimization. BVQ definitional responses were compared with responses to a behavioral measure that did not use the term "bullying" but, instead, included items that asked about its defining characteristics (repetition, intentionality, power imbalance). Concordance between the two approaches was moderate, with an area under the receiver operating curve of .72. BVQ responses were more strongly associated with students indicating repeated victimization and multiple forms of victimization, than with power imbalance in their relationship with the bully. Findings indicate that the BVQ is a valid measure of repeated victimization and a broad range of victimization experiences but may not detect the more subtle and complex power imbalances that distinguish bullying from other forms of peer victimization. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  1. Bullies, Victims, and Bully/Victims: Distinct Groups of At-Risk Youth.

    Science.gov (United States)

    Haynie, Denise L.; Nasel, Tonja; Eitel, Patricia; Crump, Aria Davis; Saylor, Keith; Yu, Kai; Simons-Morton, Bruce

    2001-01-01

    Surveyed middle school students on incidents of bullying and victimization. Found that psychosocial and behavioral predictors such as problem behaviors, attitudes toward deviance, peer influences, depressive symptoms, school-related functioning, and parenting linearly separated never bullied or victimized students from the victim group, from the…

  2. Moral Reasoning and Emotion Attributions of Adolescent Bullies, Victims, and Bully-Victims

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-01-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…

  3. Service providers' reactions to intimate partner violence as a function of victim sexual orientation and type of abuse.

    Science.gov (United States)

    Basow, Susan A; Thompson, Janelle

    2012-05-01

    In this online vignette study, a national sample of domestic violence shelter service providers (N = 282) completed a 10-item questionnaire about a woman experiencing intimate partner violence (IPV). Scenarios varied in terms of couple sexual orientation (heterosexual or lesbian) and type of abuse (physical or nonphysical). Results indicate that although participants did not overtly discriminate against a woman in a lesbian relationship, they were less likely to perceive her as a victim, and their acceptance of a lesbian as a client was more dependent on their comfort with her than was the case for a woman in a heterosexual relationship. Type of abuse, as expected, had a main effect on many questions, with physical abuse taken more seriously than nonphysical abuse. Scores on the Attitudes Toward Lesbians subscale (Herek) were unrelated to responses. Implications for service providers are discussed.

  4. Reporting Crime Victimizations to the Police and the Incidence of Future Victimizations: A Longitudinal Study.

    Science.gov (United States)

    Ranapurwala, Shabbar I; Berg, Mark T; Casteel, Carri

    2016-01-01

    Law enforcement depends on cooperation from the public and crime victims to protect citizens and maintain public safety; however, many crimes are not reported to police because of fear of repercussions or because the crime is considered trivial. It is unclear how police reporting affects the incidence of future victimization. To evaluate the association between reporting victimization to police and incident future victimization. We conducted a retrospective cohort study using National Crime Victimization Survey 2008-2012 data. Participants were 12+ years old household members who may or may not be victimized, were followed biannually for 3 years, and who completed at least one follow-up survey after their first reported victimization between 2008 and 2012. Crude and adjusted generalized linear mixed regression for survey data with Poisson link were used to compare rates of future victimization. Out of 18,657 eligible participants, 41% participants reported to their initial victimization to police and had a future victimization rate of 42.8/100 person-years (PY) (95% CI: 40.7, 44.8). The future victimization rate of those who did not report to the police (59%) was 55.0/100 PY (95% CI: 53.0, 57.0). The adjusted rate ratio comparing police reporting to not reporting was 0.78 (95%CI: 0.72, 0.84) for all future victimizations, 0.80 (95% CI: 0.72, 0.90) for interpersonal violence, 0.73 (95% CI: 0.68, 0.78) for thefts, and 0.95 (95% CI: 0.84, 1.07) for burglaries. Reporting victimization to police is associated with fewer future victimization, underscoring the importance of police reporting in crime prevention. This association may be attributed to police action and victim services provisions resulting from reporting.

  5. Does the health status of intimate partner violence victims warrant pharmacies as portals for public health promotion?

    Science.gov (United States)

    Cerulli, Catherine; Cerulli, Jennifer; Santos, Elizabeth J; Lu, Najii; He, Hua; Kaukeinen, Kimberly; White, Anne Marie; Tu, Xin

    To explore whether the health status of intimate partner violence (IPV) victims warrants pharmacies to be portals for public health promotion. Specific objectives included (1) identifying prevalence of IPV including domestic violence (DV) and sexual assault (SA) in a community sample, (2) describing characteristics and correlates of DV/SA between participants who reported and did not report DV/SA, and (3) exploring whether DV/SA status is related to mental health medication use. Cross sectional. Upstate New York during 2006. English- and Spanish-speaking respondents younger than 65 years of age answering four questions to assess DV/SA. Secondary analysis of a countywide random telephone survey, the 2006 Monroe County Adult Health Survey, which collects prevalence data on health behaviors and health status indicators. To determine whether those reporting DV/SA are at increased odds for mental health medication use, controlling for other sociodemographic- and health-related variables. The survey response rate was 30.3%, with 1,881 respondents meeting inclusion criteria. Those reporting DV/SA were almost twice as likely to use mental health medications. However, when controlling for other variables, only poor mental and physical health were significant in increasing the odds of mental health medication use. The analyses reported here suggest that DV/SA victims in a community sample use mental health medications. When controlling for other variables, survey respondents reported worse physical and mental health. If pharmacies are suitable portals for DV/SA outreach, curricula would need to provide the knowledge and skills needed to take an active role in this public health promotion.

  6. Symbolic Victimization and Real World Fear.

    Science.gov (United States)

    Morgan, Michael

    1983-01-01

    Examines the relationship between victimization of characters in television drama and susceptibility to the viewers' cultivation of a sense of personal risk in the real world. Found that viewers whose fictional counterparts are more likely to be shown as victims show stronger associations between viewing and perceived vulnerability. (PD)

  7. Debate of victims studies. 1. ed.

    International Nuclear Information System (INIS)

    Kosovski, E.; Piedade Junior, H.; Mayr, E.

    1990-01-01

    This book shows some aspects and the effects of several types of accidents in the victims, including the psychological considerations, changes in theirs behaviour, concepts, clinical diagnostic, etc. Victims of nuclear, transit terrorism and work accidents are studied. (C.G.C.)

  8. Relational Aggression and Victimization in College Students

    Science.gov (United States)

    Dahlen, Eric R.; Czar, Katherine A.; Prather, Emily; Dyess, Christy

    2013-01-01

    For this study we explored relational aggression and victimization in a college sample (N = 307), examining potential gender and race differences, correlates, and the link between relational aggression and common emotional and behavioral problems, independent of relational victimization. Gender and race differences were observed on relational…

  9. Emergency Care of the Snakebite Victim.

    Science.gov (United States)

    Ballard, Carol N.

    1994-01-01

    Describes emergency care of snakebite victims, including noting signs and symptoms of venomous snakebites, keeping the victim calm, and seeking immediate medical attention. Provides information on variables that affect the amount of injected venom and how to distinguish nonpoisonous from poisonous snakes. (LP)

  10. Male Rape Victim and Perpetrator Blaming

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2010-01-01

    One of four possible vignettes manipulated by (a) level of rape myth contained within them (low vs. high) and (b) type of rape (stranger vs. acquaintance) was presented to participants followed by scales measuring victim blame, perpetrator blame, belief in a just world, sex-role egalitarian beliefs, and male rape myth acceptance. Victim blaming…

  11. 78 FR 52877 - VOCA Victim Assistance Program

    Science.gov (United States)

    2013-08-27

    ... these requirements has merely been re-worked for clarity. Under the proposed rule SAAs must identify... victim populations will allow OVC and SAAs to better tailor their training and technical assistance and... SAAs may use for these purposes. Funding victim service programs located in adjacent States. Program...

  12. ASD and PTSD in Rape Victims

    Science.gov (United States)

    Elklit, Ask; Christiansen, Dorte M.

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims shortly after the rape or attempted rape. The PTSD…

  13. Teacher Victimization in Authoritative School Environments

    Science.gov (United States)

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  14. Trafficking in persons : A victim's perspective

    NARCIS (Netherlands)

    Rijken, Conny; Rijken, Conny; Piotrowicz, Ryszard; Uhl, Baerbel Heide

    2017-01-01

    Historically, protection and assistance to victims of human trafficking in many countries is anchored in migration law and dependent on whether or not a residence permit is granted to the victim. Apart from some limited exceptions, cooperation with law enforcement authorities in criminal

  15. A fully liquid DTaP-IPV-HB-PRP-T hexavalent vaccine for primary and booster vaccination of healthy Turkish infants and toddlers

    Science.gov (United States)

    Ceyhan, Mehmet; Yıldırım, İnci; Tezer, Hasan; Devrim, İlker; Feroldi, Emmanuel

    2017-08-23

    Background/aim: Immunogenicity and safety of a primary series of a fully liquid, hexavalent DTaP-IPV-HB-PRP-T vaccine given at 2, 3, and 4 months of age compared to licensed comparators and a DTaP-IPV-HB-PRP-T booster at 15?18 months were evaluated. Materials and methods: This was a Phase III, randomized, open-label trial. Primary series (no hepatitis B [HB] at birth) of DTaP-IPV-HB-PRP-T (N = 155) (group 1) or licensed control vaccines (DTaP-IPV//PRP-T and standalone HB: N = 155) (group 2) and DTaP-IPV-HB-PRP-T booster were administered. Noninferiority was evaluated 1 month postprimary series for anti-HB seroprotection (SP). All other analyses were descriptive. Safety was assessed from parental reports. Results: Postprimary series noninferiority of anti-HB ≥ 10 mIU/mL was demonstrated for the DTaP-IPV-HB-PRP-T vaccine (94.0%) compared to the licensed control (96.1%). Postprimary series primary SP and seroconversion (SC) rates were high and similar for both groups. Antibody persistence (prebooster) was high for each antigen and similar between groups except for HB, which was lower for DTaP-IPV-HB-PRP-T than for standalone HB. For each antigen except HB, DTaP-IPV-HB-PRP-T booster responses were high and similar in each group. Safety was good for primary and booster series and similar between groups. Conclusion: The DTaP-IPV-HB-PRP-T vaccine is immunogenic and safe when administered in a challenging primary series schedule without HB vaccination at birth.

  16. A Randomized, Controlled Study of DTaP-IPV-HB-PRP-T, a Fully Liquid Hexavalent Vaccine, Administered in a 3-, 5- and 11- to 12-month Schedule.

    Science.gov (United States)

    Vesikari, Timo; Silfverdal, Sven-Arne; Jordanov, Emilia; Feroldi, Emmanuel

    2017-01-01

    To assess the immunogenicity and safety of a fully liquid, ready-to-use hexavalent DTaP-IPV-HB-PRP-T vaccine when administered in a 2 + 1 schedule at 3, 5 and 11-12 months of age. Phase III, randomized, active-controlled, observer-blind, multicenter study. Infants were randomized to receive DTaP-IPV-HB-PRP-T (N = 275) or a licensed control hexavalent vaccine (DTaP-IPV-HB//PRP~T: N = 275), both given in coadministration with Prevenar 13. Serum was analyzed for immune responses to all vaccine antigens. Noninferiority of DTaP-IPV-HB-PRP-T to the control vaccine was tested at completion of the primary series using predefined seroprotection (SP) rate and vaccine response (VR) rates. Safety was assessed using parental reports. Noninferiority of DTaP-IPV-HB-PRP-T to the control vaccine was demonstrated postdose 3 for each antigen, and the SP (for D, T, poliovirus 1, 2 and 3, hepatitis B and polyribosylribitol phosphate) and VR rates (for pertussis toxin and filamentous hemagglutinin) were high in each group. SP rates for D, T, polio 1, 2, 3 and VR rates for pertussis toxin and filamentous hemagglutinin were similar in each group. For hepatitis B, SP rate was slightly higher for DTaP-IPV-HB//PRP~T (99.6%) than DTaP-IPV-HB-PRP-T (96.4%), and for PRP, SP rate was higher for DTaP-IPV-HB-PRP-T (93.5%) than DTaP-IPV-HB//PRP~T (85.2%). For Prevenar 13, the SP rate was high for each serotype and similar for both groups. All vaccines were well tolerated. These study findings confirm the safety and immunogenicity and thus the suitability of this fully liquid hexavalent vaccine for administration in a 2 + 1 schedule.

  17. Sexual minority youth victimization and social support: the intersection of sexuality, gender, race, and victimization.

    Science.gov (United States)

    Button, Deeanna M; O'Connell, Daniel J; Gealt, Roberta

    2012-01-01

    In comparison to heterosexual youth, sexual minority youth are more likely to experience victimization. Multiple studies have connected anti-gay prejudice and anti-gay victimization to negative outcomes. Research shows that social support may protect sexual minorities from the harmful effects of anti-gay victimization. However, rates of victimization and the negative outcomes linked to sexual identity within the sexual minority community have been relatively unexplored. Using data from three years of statewide data from heterosexual and sexual minority adolescents in grades 9-12, this study examines victimization, substance use, suicidality, and access to social support by sexuality. Results indicate that sexual minority youth are at increased risk for victimization, substance use, suicidality, and social isolation compared to their heterosexual counterparts. Results also indicate that there is very little bivariate difference within the sexual minority community. Multivariate results indicate differences among sexual minorities' experiences with victimization and substance use.

  18. Theories of intimate partner violence: from blaming the victim to acting against injustice: intersectionality as an analytic framework.

    Science.gov (United States)

    Kelly, Ursula A

    2011-01-01

    Intimate partner violence (IPV) has garnered increasing public and academic attention in the past several decades. Theories about the causes, prevention, and intervention for IPV have developed in complexity. This article provides an overview of the historical roots of IPV, as well as a description and critique of historical and contemporary theories of IPV causes and women's responses to IPV. This is followed by a discussion of the most current theoretical developments and application of critical theories to the problem of IPV. The article concludes with theoretically based implications for nursing practice and research with women who are experiencing IPV.

  19. Comparison of IPV to tOPV week 39 boost of primary OPV vaccination in Indian infants: an open labelled randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Suman Kanungo

    2017-01-01

    Conclusions: This study indicates that an IPV boost at week 39 is equivalent to tOPV in intestinal immunity, and provides higher seroconversion compared to tOPV. The major limitation of the study was the additional OPV doses receive by infants during pulse polio immunization resulted in additional mucosal boosting, diminishing the impact of IPV or tOPV boost at week 39. However, IPV for OPV boost should prove to be a step forward in the global polio eradication initiative to reduce the problem of circulating vaccine-derived poliovirus (cVDPV.

  20. Police Victimization Among Persons Who Inject Drugs Along the U.S.-Mexico Border.

    Science.gov (United States)

    Pinedo, Miguel; Burgos, Jose Luis; Zuniga, Maria Luisa; Perez, Ramona; Macera, Caroline A; Ojeda, Victoria D

    2015-09-01

    Problematic policing practices are an important driver of HIV infection among persons who inject drugs (PWID) in the U.S.-Mexico border region. This study identifies factors associated with recent (i.e., past 6 months) police victimization (e.g., extortion, physical and sexual violence) in the border city of Tijuana, Mexico. From 2011 to 2013, 733 PWID (62% male) were recruited in Tijuana and completed a structured questionnaire. Eligible participants were age 18 years or older, injected illicit drugs within the past month, and spoke Spanish or English. Multivariable logistic regression analyses identified correlates of recent experiences of police victimization (e.g., bribes, unlawful confiscation, physical and sexual violence). Overall, 56% of PWID reported a recent police victimization experience in Tijuana. In multivariable logistic regression analyses, factors independently associated with recent police victimization included recent injection of methamphetamine (adjusted odds ratio [AOR] = 1.62; 95% CI [1.18, 2.21]) and recently received injection assistance by a "hit doctor" (AOR = 1.56; 95% CI [1.03, 2.36]). Increased years lived in Tijuana (AOR = 0.98 per year; 95% CI [0.97, 0.99]) and initiating drug use at a later age (AOR = 0.96 per year; 95% CI [0.92, 0.99]) were inversely associated with recent police victimization. Physical drugusing markers may increase PWID susceptibility to police targeting and contribute to experiences of victimization. Interventions aimed at reducing police victimization events in the U.S.-Mexico border region should consider PWID's drug-using behaviors. Reducing problematic policing practices may be a crucial public health strategy to reduce HIV risk among PWID in this region.

  1. Children's Moral Emotion Attribution in the Happy Victimizer Task: The Role of Response Format.

    Science.gov (United States)

    Gummerum, Michaela; López-Pérez, Belén; Ambrona, Tamara; Rodríguez-Cano, Sonia; Dellaria, Giulia; Smith, Gary; Wilson, Ellie

    2016-01-01

    Previous research in the happy victimizer tradition indicated that preschool and early elementary school children attribute positive emotions to the violator of a moral norm, whereas older children attribute negative (moral) emotions. Cognitive and motivational processes have been suggested to underlie this developmental shift. The current research investigated whether making the happy victimizer task less cognitively demanding by providing children with alternative response formats would increase their attribution of moral emotions and moral motivation. In Study 1, 93 British children aged 4-7 years old responded to the happy victimizer questions either in a normal condition (where they spontaneously pointed with a finger), a wait condition (where they had to wait before giving their answers), or an arrow condition (where they had to point with a paper arrow). In Study 2, 40 Spanish children aged 4 years old responded to the happy victimizer task either in a normal or a wait condition. In both studies, participants' attribution of moral emotions and moral motivation was significantly higher in the conditions with alternative response formats (wait, arrow) than in the normal condition. The role of cognitive abilities for emotion attribution in the happy victimizer task is discussed.

  2. To Not Only Being Victims

    Directory of Open Access Journals (Sweden)

    Stefania Fantauzzi

    2017-11-01

    Full Text Available Hannah Arendt is against the idea that Jews were only the victims of history. Starting from the idea that the Age of Enlightenment and the Jewish emancipation put the Jewish tradition and history in crisis, she is adamant that this same history is not only full of suffering, but includes  a hidden tradition of activism that is important to uncover and to claim. The aim of these pages is to analyse the Arendtian thinking of the 30s and 40s in order to show some elements that can help us to understand what the loss of humanity means today and to indicate the possibilities of claiming and recovering it.

  3. Children’s moral emotion attribution in the happy victimizer task: the role of response format

    OpenAIRE

    Gummerum, Michaela; López Pérez, Belén; Ambrona, Tamara; Rodríguez-Cano, Sonia; Dellaria, Giulia; Smith, Gary; Wilson, Ellie

    2016-01-01

    This is an Accepted Manuscript of an article published by Taylor & Francis Group in The Journal of Genetic Psychology on 2016 available online: http://www.tandfonline.com/10.1080/00221325.2015.1103694 Previous research in the happy victimizer tradition indicated that preschool and early elementary school children attribute positive emotions to the violator of a moral norm, whereas older children attribute negative (moral) emotions. Cognitive and motivational processes have been suggested t...

  4. Moral reasoning and emotion attributions of adolescent bullies, victims, and bully-victims.

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-11-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents aged 12-18 (57% females) reported the frequency of involvement in bullying and victimization. Participants were categorized as bullies (14.3%), bully-victims (3.9%), and victims (9.7%). Moral judgment, moral justifications, and emotion attributions to a hypothetical perpetrator of a moral transgression (relational aggression) were assessed. Bullies showed more morally disengaged reasoning than non-involved students. Bully-victims more frequently indicated that violating moral rules is right. Victims produced more victim-oriented justifications (i.e., more empathy) but fewer moral rules. Among victims, the frequency of morally responsible justifications decreased and the frequency of deviant rules increased with age. The findings are discussed from an integrative moral developmental perspective. ©2011 The British Psychological Society.

  5. When and Why We See Victims as Responsible: The Impact of Ideology on Attitudes Toward Victims.

    Science.gov (United States)

    Niemi, Laura; Young, Liane

    2016-09-01

    Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.

  6. ESTADO DEL ARTE DE IPTV Y CONSIDERACIONES TÉCNICAS PARA SU MIGRACIÓN A IPV6 EN COLOMBIA

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2011-08-01

    Full Text Available El artículo tiene como objetivos centrales hacer una revisión del estado del arte de IPTV (Televisión a través de IP y una propuesta para la implementación de esta tecnología en Colombia sobre una red IPv6. La convergencia de las teleco-municaciones ha dado origen a aplicaciones IP que permiten acceso a contenidos audiovisuales digitalizados a través de re-des que hacen uso de dicho protocolo. Se abordanestudios ac-tuales que tratan características fundamentales de televisión sobre la red de datos,  como el funcionamiento, la arquitectura, los estándares en los que se basa, propuestas para evaluar las políticas de calidad de servicio y por ultimo consideraciones técnicas para su implementación en una red IPv6.

  7. Crime victims in the criminal justice system

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2003-01-01

    Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.

  8. "Gray murder": characteristics of elderly compared with nonelderly homicide victims in New York City.

    Science.gov (United States)

    Abrams, Robert C; Leon, Andrew C; Tardiff, Kenneth; Marzuk, Peter M; Sutherland, Kari

    2007-09-01

    We compared characteristics of homicides among New York City residents aged 18 years and older from 1990 to 1998 to determine differences in demographics, cause and place of death, and presence of illicit drugs and alcohol in the deceased's system. All medical examiner-certified homicides among New York City residents aged 18 years and older from 1990 to 1998 were studied (n = 11,850). Nonelderly (aged 18 to 64 years) and elderly (aged 65 years and older) victims were compared by gender, race/ethnicity, cause of death, place of death, and presence of illicit drugs or alcohol. Population-based homicide rates stratified by age, gender, and race were also calculated. Nonelderly homicide victims were significantly more likely to be male, non-White, to have been shot in the city streets, and to have evidence of illicit drug or alcohol use. Elderly victims were more likely to be female, White, to have been killed by nonfirearm injuries, and to have been killed in their own homes. The gender and race differences between age groups remained but were attenuated when population-based rates were compared. The characteristics of homicide in nonelderly adults do not apply to elderly adults in New York City. Demographic factors and vulnerabilities of the elderly may underlie these differences, pointing to the need for oversight of isolated or homebound elderly persons and for protective interventions.

  9. “Gray Murder”: Characteristics of Elderly Compared With Nonelderly Homicide Victims in New York City

    Science.gov (United States)

    Abrams, Robert C.; Leon, Andrew C.; Tardiff, Kenneth; Marzuk, Peter M.; Sutherland, Kari

    2007-01-01

    Objectives. We compared characteristics of homicides among New York City residents aged 18 years and older from 1990 to 1998 to determine differences in demographics, cause and place of death, and presence of illicit drugs and alcohol in the deceased’s system. Methods. All medical examiner–certified homicides among New York City residents aged 18 years and older from 1990 to 1998 were studied (n = 11 850). Nonelderly (aged 18 to 64 years) and elderly (aged 65 years and older) victims were compared by gender, race/ethnicity, cause of death, place of death, and presence of illicit drugs or alcohol. Population-based homicide rates stratified by age, gender, and race were also calculated. Results. Nonelderly homicide victims were significantly more likely to be male, non-White, to have been shot in the city streets, and to have evidence of illicit drug or alcohol use. Elderly victims were more likely to be female, White, to have been killed by nonfirearm injuries, and to have been killed in their own homes. The gender and race differences between age groups remained but were attenuated when population-based rates were compared. Conclusions. The characteristics of homicide in nonelderly adults do not apply to elderly adults in New York City. Demographic factors and vulnerabilities of the elderly may underlie these differences, pointing to the need for oversight of isolated or homebound elderly persons and for protective interventions. PMID:17666708

  10. Effect of LEO cycling on 125 Ah advanced design IPV nickel-hydrogen battery cells

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1990-01-01

    An advanced 125 Ah individual pressure vessel (IPV) nickel-hydrogen cell was designed. The primary function of the advanced cell is to store and deliver energy for long-term, low earth-orbit (LEO) spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent potassium hydroxide (KOH) electrolyte, (2) use of a patented catalyzed wall wick, (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management, and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion. Six 125-Ah flight cells based on this design were fabricated by Eagle-Picher. Three of the cells contain all of the advanced features (test cells) and three are the same as the test cells except they don't have catalyst on the wall wick (control cells). All six cells are in the process of being evaluated in a LEO cycle life test. The cells have accumulated about 4700 LEO cycles (60 percent DOD 10 C). There have been no cell failures; the catalyzed wall wick cells, however, are performing better.

  11. Modelování IPv6 v prostředí OMNeT++

    OpenAIRE

    Černý, Marek

    2011-01-01

    OMNeT++ je diskrétní simulátor hojně používaný k vytváření nejrůznějších síťových simulací. Lze jej dále rozšířit např. frameworkem INET, který obsahuje modely protokolů a zařízení z prostředí TCP/IP síti. V této práci se soustředíme na zkoumání současných možností balíku INET modelovat internetový protokol verze 6. Obzvláště se zaměřujeme na podporu směrování. V rámci implementace pak byly vytvořeny moduly dual-stack směrovače a dual-stack klienta s podporou manuální i automatické IPv6 adres...

  12. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  13. Implementasi Dan Perancangan Online Charging System (OCS IPTV Multichannel pada Jaringan IPv6

    Directory of Open Access Journals (Sweden)

    Bagus Wahyu Nugraha

    2014-03-01

    Full Text Available IPTV didefinisikan sebagai layanan multimedia berbentuk data seperti televisi, video, audio, text, grafik yang dikirimkan melalui jaringan berbasisi IP tetapi harus diberikan dengan persyaratan seperti QOS dan experience, security, interactivity dan reliability.  Beberapa  feature yang  dimiliki oleh IPTV ini adalah IPTV dapat menyiarkan secara live  atau prerecorded digital video program-program pendidikan, komersial, scheduling / penjadwalan program dsb. Tentunya hal ini menggunakan IPTV akan menguntungkan dari sisi bisnis mengingat semakin banyaknya pengguna broadband. Dengan konvergen antara televisi, telephone dan access internet, IPTV dapat berkembang sesuai dengan tren masa kini yaitu IP based, sehingga mudah di akses oleh pengguna dan proses charging/billing yang sesuai dengan standar bisnis yang ada. Oleh karena itu, “Design and Implementation Online Charging System (OCS IPTV Multichannel on IPv6 Network“ dibuat sebagai layanan konten yang dapat digunakan untuk teknologi yang menggunakan IP based. Dalam pembuatan rancang bangun system billing pada IPTV ini dihasilkan sebuah software yang user friendly sehingga penyedia layanan IPTV dapat dengan mudah menggunakan software yang telah dibuat.

  14. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Sehwa Song

    2009-01-01

    Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.

  15. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  16. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  17. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  18. Older Offenders and Homicide: What Can We Learn From the Chicago Homicide Dataset?

    NARCIS (Netherlands)

    Stanback, Brianne; King-Kallimanis, Bellinda L.

    2011-01-01

    Older offenders are the fastest growing group in the U.S. prison system, although little is known about older offenders who commit homicides, their victims, or the details of the crime. The current study investigated covariates associated with four categories of homicide: intimate, family,

  19. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  20. Systematization of the Introduction of IPV and Switch from tOPV to bOPV in the Americas.

    Science.gov (United States)

    Pedreira, Cristina; Thrush, Elizabeth; Jauregui, Barbara

    2017-07-01

    The synchronized introduction of the inactivated polio vaccine (IPV) and the switch from trivalent oral polio vaccine (tOPV) to bivalent oral polio vaccine (bOPV) has constituted an effort without precedents, and with astonishing results. Within the established time frame, all countries in our region managed to carry out the decision, planning, and introduction of this vaccine and subsequent switch to their national immunization schedules.The purpose of this article is to systematize the process of IPV introduction and switch in Latin America and the Caribbean, which constitutes an important piece in the documentation of the polio legacy in the Americas. Regional level as well as country perspectives and viewpoints are described. Analyzing and summarizing the lessons learned from the introduction of IPV and the switch from tOPV to bOPV can be useful for the introduction of new vaccines in the Pan American Health Organization (PAHO) region and in other regions of the world, and to help our own region successfully carry out another synchronized vaccine introduction in the future, if necessary. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  1. Alcohol Use, Hostile Sexism, and Religious Self-Regulation: Investigating Risk and Protective Factors of IPV Perpetration.

    Science.gov (United States)

    Lynch, Kellie R; Renzetti, Claire M

    2017-05-01

    Research suggests that the relationship between alcohol use and intimate partner violence (IPV) is moderated by a range of other factors. Therefore, we investigated the relationship between alcohol use, hostile sexism, and religious self-regulation with perpetration. Using a national sample of 255 men, we found that hostile sexism was associated with physical violence toward a partner and alcohol use was positively associated with psychological abuse toward a partner. With regard to religious self-regulation, we found that introjected religious self-regulation was positively associated with hostile sexism and positively associated with perpetrating physical IPV. Identified religious self-regulation was negatively associated with physical violence perpetration. We also found significant interactions among our independent measures on physical IPV perpetration. These analyses suggest that increased alcohol consumption elevates the risk for physical violence perpetration among men who are high in introjected religious self-regulation and low in hostile sexism, while reducing the risk for perpetration in men who are high in identified religious self-regulation and low in hostile sexism. Implications and limitations of the findings are discussed.

  2. Revisión de la seguridad en la implementación de servicios sobre IPv6

    Directory of Open Access Journals (Sweden)

    Raul Bareño Gutierrez

    2016-01-01

    Full Text Available En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.

  3. Breast Cancer a Multifaceted Phenomenon in Older Women in Nigeria

    African Journals Online (AJOL)

    The paper takes a look at Breast Cancer a Multifaceted Phenomenon in Older Women. The risk factors, screening, therapy and diagnosis, some forms of modern treatment were mentioned and described, their effects on victims enumerated and possible remedies spelt out for the management, reduction or eradication of the ...

  4. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs

    OpenAIRE

    Dominic Savio, Lourdes Gino

    2016-01-01

    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  5. A victim-centered approach to justice? Victim satisfaction effects on third-party punishments.

    Science.gov (United States)

    Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M

    2012-10-01

    Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  6. Phase II and III Clinical Studies of Diphtheria-Tetanus-Acellular Pertussis Vaccine Containing Inactivated Polio Vaccine Derived from Sabin Strains (DTaP-sIPV).

    Science.gov (United States)

    Okada, Kenji; Miyazaki, Chiaki; Kino, Yoichiro; Ozaki, Takao; Hirose, Mizuo; Ueda, Kohji

    2013-07-15

    Phase II and III clinical studies were conducted to evaluate immunogenicity and safety of a novel DTaP-IPV vaccine consisting of Sabin inactivated poliovirus vaccine (sIPV) and diphtheria-tetanus-acellular pertussis vaccine (DTaP). A Phase II study was conducted in 104 healthy infants using Formulation H of the DTaP-sIPV vaccine containing high-dose sIPV (3, 100, and 100 D-antigen units for types 1, 2, and 3, respectively), and Formulations M and L, containing half and one-fourth of the sIPV in Formulation H, respectively. Each formulation was administered 3 times for primary immunization and once for booster immunization. A Phase III study was conducted in 342 healthy infants who received either Formulation M + oral polio vaccine (OPV) placebo or DTaP + OPV. The OPV or OPV placebo was orally administered twice between primary and booster immunizations. Formulation M was selected as the optimum dose. In the Phase III study, the seropositive rate was 100% for all Sabin strains after primary immunization, and the neutralizing antibody titer after booster immunization was higher than in the control group (DTaP + OPV). All adverse reactions were clinically acceptable. DTaP-sIPV was shown to be a safe and immunogenic vaccine. JapicCTI-121902 for Phase II study, JapicCTI-101075 for Phase III study (http://www.clinicaltrials.jp/user/cte_main.jsp).

  7. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  8. Predictors and protective factors for adolescent Internet victimization

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving

    2012-01-01

    To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....

  9. Victims of Rape: Repeated Assessment of Depressive Symptoms.

    Science.gov (United States)

    Atkeson, Beverly M.; And Others

    1982-01-01

    Investigated depressive symptoms in rape victims (N=115) for one year following their assaults. Depressive symptoms were higher in victims than in controls. By four months postrape, depressive symptoms in the victim group had diminished, and the victims were no longer significantly different from the nonvictim control group. (Author)

  10. Cyber socializing and victimization of women

    Directory of Open Access Journals (Sweden)

    Halder Debarati

    2009-01-01

    Full Text Available Web 2.01 has redefined the virtual life of ordinary individuals and has given wide opportunities to internet users including women to exchange ideas, interact with like minded people and participate in the development of virtual societies as per one's own choices. Social networking websites (SNWs, a segment of Web 2.0 is very popular among the internet users. However, there is a dark side of these SNW's too. They have become havens for offenders to victimize women, the most vulnerable targets in the internet, after children. In this paper, we examine the victimization of women in the social networking websites in general, analyze the trends of such victimization from socio - legal - victimological angle and ascertain the reasons for the growth of such victimization.

  11. La victime, acteur de la sécurité ? / The victim, a security actor ?

    Directory of Open Access Journals (Sweden)

    Dieu François

    2012-08-01

    Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.

  12. Protecting victims of elder financial exploitation: the role of an Elder Abuse Forensic Center in referring victims for conservatorship.

    Science.gov (United States)

    Gassoumis, Zachary D; Navarro, Adria E; Wilber, Kathleen H

    2015-01-01

    The aim of this study was to examine the extent to which an Elder Abuse Forensic Center protects financial exploitation (FE) victims through referral to the Office of the Public Guardian (PG) for investigation and possible conservatorship (called 'guardianship' in many states). Los Angeles County Elder Abuse Forensic Center cases involving adults aged 65 and older (April 2007-December 2009) were matched using one-to-one propensity-score matching to 33,650 usual care Adult Protective Services (APS) cases. The final analysis sample consisted of 472 FE cases. Compared to usual care, Forensic Center cases were more likely to be referred to the PG for investigation (30.6%, n = 72 vs. 5.9%, n = 14, p Elder Abuse Forensic Center conceptual model and contribute to an emerging body of evidence on the role of the Forensic Center in addressing elder abuse.

  13. Stop Harassment!: men's reactions to victims' confrontation

    OpenAIRE

    Carmen Herrera, M.; Herrera, Antonio; Expósito, Francisca

    2014-01-01

    Sexual harassment is one of the most widespread forms of gender violence. Perceptions of sexual harassment depend on gender, context, the perceivers' ideology, and a host of other factors. Research has underscored the importance of coping strategies in raising a victim's self-confidence by making her feel that she plays an active role in overcoming her own problems. The aim of this study was to assess the men's perceptions of sexual harassment in relation to different victim responses. The st...

  14. Incendiari e vittime / Arsonists and Victims / Incendiaires et victimes

    Directory of Open Access Journals (Sweden)

    Roberta Bisi

    2008-04-01

    Full Text Available Human beings need fire !Contrary to other living beings, mankind could not live without fire so it is quite astonishing to observe that most of the fires which burn on the earth are caused by man.Many fires spread all over the North Mediterranean area, from Portugal to Turkey, during the summer 2007.Human beings and fire: associated to the sacrifice of Titan Prometheus which was meant to be a sort of pattern to be followed by men to honour the gods.Fire is alive like water and air but it is difficult to capture it with the eyes: we can look at it for a long time before we discover that it never looks like itself.Fire has brought about important changes to human life, giving it much more security and comfort.However, the destructive power of fire is a real threat which not only takes many victims and results in wounded, intoxicated and homeless people but its force also wipes out and destroys places recognized as the heritage of mankind.Les hommes ont besoin du feu! Contrairement à tous les autres êtres vivants, les hommes ne pourraient pas vivre comme ils le font sans le feu; d'autre part, le fait que la plupart des feux qui brûlent sur la planète sont causés par l’homme, représente un aspect inquiétant.Pendant l’été 2007, beaucoup d’incendies ont frappé toute la zone du Nord de la Méditerranée, du Portugal à la Turquie. Hommes et feu : un binôme lié à la création du sacrifice du Titan Prométhée et qui aurait ainsi établi le modèle suivi par les hommes afin d'honorer les dieux.Le feu est vivant, comme l’eau et l'air, mais il est insaisissable au regard, c’est à dire que nous pouvons passer beaucoup de temps à le regarder mais il ne sera jamais égal à lui même. L’usage du feu a rendu la vie de l’homme plus sûre et plus confortable et il a modifié, au cours du temps, la face de la terre.Toutefois, la force déstructrice du feu représente une menace réelle qui fait des victimes, des blessés, des intoxiqu

  15. Adolescent Violent Victimization and Precocious Union Formation*

    Science.gov (United States)

    C. Kuhl, Danielle; Warner, David F.; Wilczak, Andrew

    2013-01-01

    This article bridges scholarship in criminology and family sociology by extending arguments about “precocious exits” from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization (“street” violence) on the timing of first co-residential union formation—differentiating between marriage and cohabitation—in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance. PMID:24431471

  16. Adolescent Violent Victimization and Precocious Union Formation.

    Science.gov (United States)

    C Kuhl, Danielle; Warner, David F; Wilczak, Andrew

    2012-11-01

    This article bridges scholarship in criminology and family sociology by extending arguments about "precocious exits" from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization ("street" violence) on the timing of first co-residential union formation-differentiating between marriage and cohabitation-in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance.

  17. Predictors of peer victimization among Peruvian adolescents in the young lives cohort.

    Science.gov (United States)

    Lister, Cameron; Merrill, Ray M; Vance, David; West, Joshua H; Hall, P Cougar; Crookston, Benjamin T

    2015-02-01

    Bully-victimization is a widespread public health issue with significant negative effects on both social function and psychological well-being. Existing research in Peru shows high prevalence of bullying. However, researchers have yet to fully understand the phenomenon of victimization in developing regions. The purpose of this study was to characterize victimization patterns over time, along with the predictors of victimization from a cohort of Peruvian adolescents enrolled in the young lives (YL) study. This study examined data from YL, a longitudinal study of poverty, health, and development, which examined data from the older cohort of children in Peru across three rounds (ages 8, 12, and 15 years). The sample consisted of 714 children from 74 communities that represent 20 districts in Peru. After adjusting for urban/rural setting, there remained a significantly lower wealth index for children who were bullied at ages 8 and 12 years. Exploratory analysis showed that although those in the lowest quartile of body mass index (BMI) were significantly more likely to be bullied at age 8 years, this association waned over time. A worse caregiver assessment of child's health compared with others was associated with a significantly greater risk of bully-victimization. At age 8 years, caregiver education was significantly lower among those bullied compared with those who were not bullied. This study showed several factors as the predictors of victimization in the early years, including being male and having low BMI, low socioeconomic status, and low parental/caregiver education. Further longitudinal studies should be conducted to determine the extent to which these predictors vary in significance over time.

  18. Older adults abuse in three Brazilian cities

    Directory of Open Access Journals (Sweden)

    Rosalina Aparecida Partezani Rodrigues

    Full Text Available ABSTRACT Objective: To analyze the police reports filed by older adults who suffered abuse in order to identify the socio-demographic characteristics of victims and aggressors, type of violence, location, as well as to compare rates in three Brazilian cities in the period from 2009 to 2013. Method: Ecological study, in which 2,612 police reports registered in Police Stations were analyzed. An instrument was used to obtain data from the victim, the aggressor and the type of violence. Results: Psychological abuse predominated and most cases occurred in the older adults own home. In the cities of Ribeirão Preto and João Pessoa, the older adults presented similar rates for both gender. Regarding the standardized rates, in João Pessoa, there was a rise of this type of abuse in the two first years, and later there was a certain stability. In the city of Teresina, there was an increase, also observed in the city of Ribeirão Preto in the three first years, followed by a decrease. Conclusion: Older adults abuse is a cultural phenomenon difficult to be reported by them, since it occurs in the family context.

  19. Debate: Prevention and Victim Compensation

    Directory of Open Access Journals (Sweden)

    Nisha Varia

    2014-09-01

    Full Text Available Afroza, a Bangladeshi woman who worked for sixteen years without getting paid and was not allowed to go home to visit her family. Keni, an Indonesian woman whose employers injured her with a hot iron, leaving disfiguring third-degree burns all over her body. Kartika, an older Sri Lankan woman whose employers made her work around the clock without pay, shaved her head to humiliate her and gouged pieces of flesh out of her arm with knives. These are some of the women whose faces and stories still haunt me after ten years of investigating human rights abuses against migrant domestic workers in Asia and the Middle East.

  20. Bystander Involvement in Peer Victimization: The Value of Looking beyond Aggressors and Victims

    Science.gov (United States)

    Wiens, Brenda A.; Dempsey, Allison

    2009-01-01

    Peer victimization has been a focus of both research and prevention program development. This construct is typically measured from the victim and aggressor perspectives. However, prevention programming often includes an additional bystander perspective. The present study evaluated whether questions regarding witnessing peer victimization…

  1. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    Directory of Open Access Journals (Sweden)

    Stevković Ljiljana

    2013-01-01

    Full Text Available Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization. Empirical analysis of the criminological consequences of early violent victimization in adulthood are an exception in scientific studies in Serbia. The aim of the paper is to present the results of research into the influence of early violent victimization on violent crime of adult men and women. After the introduction a brief overview of the worldwide research confirming the correlation between the experience of violent victimization and subsequent violent behavior is given. The results of the research conducted by the author will then be discussed. The results illustrate the possibility of predicting violent criminal behavior in adulthood based on indicators of direct and indirect victimization in childhood. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  2. Do victims only cry? Victim-survivors and their grassroots organizations in Peru

    NARCIS (Netherlands)

    de Waardt, M.F.; Ouweneel, A.

    2012-01-01

    De Waardt discusses associations of victims of the 1980s violent conflict in Peru, which she relates to the Peruvian cultural tradition of grassroots organizations. She conveys the substantial existence of victim-survivor associations, the social support its members find amongst each other, and the

  3. Older workers

    NARCIS (Netherlands)

    Ybema,J.F.; Giesen, F.

    2014-01-01

    Due to an ageing population and global economic competition, there is a societal need for people to extend their working lives while maintaining high work productivity. This article presents an overview of the labour participation, job performance, and job characteristics of older workers in the

  4. IPv6 ネットワークにおける BGP 経路制御トラヒックの解析

    OpenAIRE

    有田, 真也

    2004-01-01

    インターネットは 1990 年代に急速に普及し、我々の生活やビジネスを変えるまでに至っている。現在、インターネットのパケット通信において主に利用されているのは IPv4 である。しかし、インターネットが爆発的に普及するにつれて IP アドレスの枯渇など、IPv4 の欠点がいくつか明らかになり、新たなインターネットプロトコルであるIPv6 が開発された。最近では、IPv6 の実装も着実に進んでおり、日本ではさまざまな応用分野で IPv6 のビジネス化を狙った実証実験が行われている。こうした状況で、本論文は IPv6 ネットワークの BGP 経路制御トラヒックの解析を行った。そして、少数の不安定な経路が IPv6 ネットワークにおける Routing Instability に大きな影響を与えていることや Routing Instability の統計的特徴を明らかにした。...

  5. A fully liquid DTaP-IPV-Hep B-PRP-T hexavalent vaccine for primary and booster vaccination of healthy Mexican children.

    Science.gov (United States)

    Aquino, Amalia Guadalupe Becerra; Brito, Maricruz Gutiérrez; Doniz, Carlos E Aranza; Herrera, Juan Francisco Galán; Macias, Mercedes; Zambrano, Betzana; Plennevaux, Eric; Santos-Lima, Eduardo

    2012-10-05

    To evaluate an investigational, fully liquid hexavalent diphtheria-tetanus-acellular pertussis-inactivated poliovirus-hepatitis B-Haemophilus influenzae type b (DTaP-IPV-Hep B-PRP-T: Hexaxim™) vaccine for primary and booster vaccination of healthy children in Mexico. Infants (N=1189) were randomized to receive one of three lots of the DTaP-IPV-Hep B-PRP-T vaccine or a licensed hexavalent control vaccine (Infanrix™ hexa) for primary vaccination at 2, 4 and 6 months. All participants who completed the primary series and agreed to participate in the booster part of the study received a dose of the investigational vaccine at 15-18 months of age. Validated serological assays and parental reports were used to assess immunogenicity and safety, respectively. Post-primary vaccination, ≥95.8% of participants in both the DTaP-IPV-Hep B-PRP-T and control groups were seroprotected (SP) against diphtheria, tetanus, poliovirus, hepatitis B and PRP, or had seroconverted (SC) to the pertussis toxin (PT) and filamentous hemagglutinin (FHA) pertussis antigens. The SP/SC rates induced by the three DTaP-IPV-Hep B-PRP-T lots were equivalent. No differences in SP/SC rates were observed between the pooled lots of investigational vaccine and the control vaccine. Antibody persistence at 15-18 months was comparable between groups, with strong increases in all antibody concentrations post-DTaP-IPV-Hep B-PRP-T booster. Both vaccines were well tolerated for primary vaccination, as was the booster dose of DTaP-IPV-Hep B-PRP-T. These study findings confirm the suitability of the combined, fully liquid DTaP-IPV-Hep B-PRP-T vaccine for inclusion in routine childhood vaccination schedules. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Victimization experiences of adolescents in Malaysia.

    Science.gov (United States)

    Choo, Wan-Yuen; Dunne, Michael P; Marret, Mary J; Fleming, Marylou; Wong, Yut-Lin

    2011-12-01

    There has been little community-based research regarding multiple-type victimization experiences of young people in Asia, and none in Malaysia. This study aimed to estimate prevalence, explore gender differences, as well as describe typical perpetrators and family and social risk factors among Malaysian adolescents. A cross-sectional survey of 1,870 students was conducted in 20 randomly selected secondary schools in Selangor state (mean age: 16 years; 58.8% female). The questionnaire included items on individual, family, and social background and different types of victimization experiences in childhood. Emotional and physical types of victimization were most common. A significant proportion of adolescents (22.1%) were exposed to more than one type, with 3% reporting all four types. Compared with females, males reported more physical, emotional, and sexual victimization. The excess of sexual victimization among boys was due to higher exposure to noncontact events, whereas prevalence of forced intercourse was equal for both genders (3.0%). Although adult male perpetrators predominate, female adults and peers of both genders also contribute substantially. Low quality of parent-child relationships and poor school and neighborhood environments had the strongest associations with victimization. Family structure (parental divorce, presence of step-parent or single parent, or household size), parental drug use, and rural/urban location were not influential in this sample. This study extends the analysis of multiple-type victimization to a Malaysian population. Although some personal, familial, and social factors correlate with those found in western nations, there are cross-cultural differences, especially with regard to the nature of sexual violence based on gender and the influence of family structure. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  7. Psychosocial profile of bullies, victims, and bully-victims: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Marie eLeiner

    2014-01-01

    Full Text Available While adverse conditions in a child’s life do not excuse inappropriate behavior, they may cause emotional and behavioral problems that require treatment as a preventive measure to reduce the likelihood of bullying. We aimed to identify differences in the psychosocial profiles of adolescents who classified themselves as bullies, victims, or bully-victims. We performed a cross-sectional study in which data were collected between January 2009 and January 2010 from seven university-based clinics in a large metropolitan area with a predominantly Mexican-American population. We collected data on physical aggression among adolescents who self-categorized into the following groups: uninvolved, bullies, victims, and bully-victims. We determined the psychosocial profiles of the adolescents based on responses to the Youth Self Report (YSR and parent’s responses to the Child Behavior Checklist (CBCL. A one-way analysis of variance and multivariate regression analyses were performed to compare the various components of the psychosocial profiles among the groups. Our analysis of the CBCL and the YSR assessments identified differences between the uninvolved group and one or more of the other groups. No significant differences were observed among the bully, victim, and bully-victim groups based on the CBCL. We did find significant differences among those groups based on the YSR, however. Our results suggest that emotional and behavioral problems exist among bullies, victims, and bully-victims. Therefore, treatment should not focus only on the victims of bullying; treatment is equally important for the other groups (bullies and bully-victims. Failure to adequately treat the underlying problems experienced by all three groups of individuals could allow the problems of bullying to continue.

  8. Victimization from bullying among school-attending adolescents in grades 7 to 10 in Zambia

    Directory of Open Access Journals (Sweden)

    Emmanuel Rudatsikira

    2012-01-01

    Full Text Available BACKGROUND: Among school- attending adolescents, victimization from bullying is associated with anxiety, depression and poor academic performance. There are limited reports on victimization from bullying in Zambia; we therefore conducted this study to determine the prevalence and correlates for victimization from bullying among adolescents in grades 7 to 10 in the country in order to add information on the body of knowledge on victimization from bullying. METHODS: The 2004 Zambia Global School-based Health Survey (GSHS data among adolescents in grades 7 to 10 were obtained from the World Health Organization. We estimated the prevalence of victimization from bullying. We also conducted weighted multivariate logistic regression analysis to determine independent factors associated with victimization from bullying, and report adjusted odds ratios (AOR and their 95% confidence intervals (CI. RESULTS: Of 2136 students who participated in the 2004 Zambia GSHS, 1559 had information on whether they were bullied or not. Of these, 1559 students, 62.8% (60.0% of male and 65.0% of female participants reported having been bullied in the previous 30 days to the survey. We found that respondents of age less than 14 years were 7% (AOR=0.93; 95%CI [0.91, 0.95] less likely to have been bullied compared to those aged 16 years or older. Being a male (AOR=1.07; 95%CI [1.06, 1.09], lonely (AOR=1.24; 95%CI [1.22, 1.26], worried (AOR=1.12; 95%CI [1.11, 1.14], consuming alcohol (AOR=2.59; 95%CI [2.55, 2.64], missing classes (AOR=1.30; 95%CI [1.28, 1.32], and considering attempting suicide (AOR=1.20; 95%CI [1.18, 1.22] were significantly associated with bullying victimization. CONCLUSIONS: Victimization from bullying is prevalent among in-school adolescents in grades 7 to 10 in Zambia, and interventions to curtail it should consider the factors that have been identified in this study.

  9. Victimization from bullying among school-attending adolescents in grades 7 to 10 in Zambia.

    Science.gov (United States)

    Siziya, Seter; Rudatsikira, Emmanuel; Muula, Adamson S

    2012-01-01

    Among school- attending adolescents, victimization from bullying is associated with anxiety, depression and poor academic performance. There are limited reports on victimization from bullying in Zambia; we therefore conducted this study to determine the prevalence and correlates for victimization from bullying among adolescents in grades 7 to 10 in the country in order to add information on the body of knowledge on victimization from bullying. The 2004 Zambia Global School-based Health Survey (GSHS) data among adolescents in grades 7 to 10 were obtained from the World Health Organization. We estimated the prevalence of victimization from bullying. We also conducted weighted multivariate logistic regression analysis to determine independent factors associated with victimization from bullying, and report adjusted odds ratios (AOR) and their 95% confidence intervals (CI). Of 2136 students who participated in the 2004 Zambia GSHS, 1559 had information on whether they were bullied or not. Of these, 1559 students, 62.8% (60.0% of male and 65.0% of female) participants reported having been bullied in the previous 30 days to the survey. We found that respondents of age less than 14 years were 7% (AOR=0.93; 95%CI [0.91, 0.95]) less likely to have been bullied compared to those aged 16 years or older. Being a male (AOR=1.07; 95%CI [1.06, 1.09]), lonely (AOR=1.24; 95%CI [1.22, 1.26]), worried (AOR=1.12; 95%CI [1.11, 1.14]), consuming alcohol (AOR=2.59; 95%CI [2.55, 2.64]), missing classes (AOR=1.30; 95%CI [1.28, 1.32]), and considering attempting suicide (AOR=1.20; 95%CI [1.18, 1.22]) were significantly associated with bullying victimization. Victimization from bullying is prevalent among in-school adolescents in grades 7 to 10 in Zambia, and interventions to curtail it should consider the factors that have been identified in this study.

  10. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  11. Aging in the Shadow of Violence: A Phenomenological Conceptual Framework for Understanding Elderly Women Who Experienced Lifelong IPV.

    Science.gov (United States)

    Band-Winterstein, Tova

    2015-01-01

    This article suggests a heuristic framework for understanding elderly women's "lived experience" of lifelong intimate partner violence (IPV). This framework is based on the phenomenological qualitative studies of 31 women, aged 60-83, using a semistructured interview guide. From the results, a matrix emerged built on two axes. The first axis consists of three phenomenological dimensions: suffering, a "ticking clock," and life wisdom. The second axis consists of four themes that emerged from the content analysis: loneliness, regret, being in a state of waiting, and being a living monument to perpetual victimhood. The practical implications of these phenomenological findings are then discussed.

  12. Immunogenicity and safety of three aluminium hydroxide adjuvanted vaccines with reduced doses of inactivated polio vaccine (IPV-Al) compared with standard IPV in young infants in the Dominican Republic: a phase 2, non-inferiority, observer-blinded, randomised, and controlled dose investigation trial.

    Science.gov (United States)

    Rivera, Luis; Pedersen, Rasmus S; Peña, Lourdes; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Nielsen, Pernille I; Sørensen, Charlotte; Dietrich, Jes; Bandyopadhyay, Ananda S; Thierry-Carstensen, Birgit

    2017-07-01

    Cost and supply constraints are key challenges in the use of inactivated polio vaccine (IPV). Dose reduction through adsorption to aluminium hydroxide (Al) is a promising option, and establishing its effectiveness in the target population is a crucial milestone in developing IPV-Al. The aim of this clinical trial was to show the non-inferiority of three IPV-Al vaccines to standard IPV. In this phase 2, non-inferiority, observer-blinded, randomised, controlled, single-centre trial in the Dominican Republic, healthy infants aged 6 weeks, not previously polio vaccinated, were allocated after computer-generated randomisation by block-size of four, to receive one of four IPV formulations (three-times reduced dose [1/3 IPV-Al], five-times reduced dose [1/5 IPV-Al], ten-times reduced dose [1/10 IPV-Al], or IPV) intramuscularly in the thigh at 6, 10, and 14 weeks of age. The primary outcome was seroconversion for poliovirus types 1, 2, and 3 with titres more than or equal to four-fold higher than the estimated maternal antibody titre and more than or equal to 8 after three vaccinations. Non-inferiority was concluded if the lower two-sided 90% CI of the seroconversion rate difference between IPV-Al and IPV was greater than -10%. The safety analyses were based on the safety analysis set (randomly assigned participants who received at least one trial vaccination) and the immunogenicity analyses were based on the per-protocol population. This study is registered with ClinicalTrials.gov registration, number NCT02347423. Between Feb 2, 2015, and Sept 26, 2015, we recruited 824 infants. The per-protocol population included 820 infants; 205 were randomly assigned to receive 1/3 IPV-Al, 205 to receive 1/5 IPV-Al, 204 to receive 1/10 IPV-Al, and 206 to receive IPV. The proportion of individuals meeting the primary endpoint of seroconversion for poliovirus types 1, 2, and 3 was already high for the three IPV-Al vaccines after two vaccinations, but was higher after three vaccinations

  13. The association between chronic bullying victimization with weight status and body self-image: a cross-national study in 39 countries.

    Science.gov (United States)

    Lian, Qiguo; Su, Qiru; Li, Ruili; Elgar, Frank J; Liu, Zhihao; Zheng, Dongpeng

    2018-01-01

    Childhood obesity and school bullying are pervasive public health issues and known to co-occur in adolescents. However, the association between underweight or thinness and chronic bullying victimization is unclear. The current study examined whether chronic bullying victimization is associated with weight status and body self-image. A school-based, cross-sectional study in 39 North American and European countries and regions was conducted. A total of 213,595 adolescents aged 11, 13, and 15 years were surveyed in 2009/10. Chronic bullying victimization was identified using the Revised Olweus Bully/Victim Questionnaire. Weight status was determined using self-reported height and weight and the body mass index (BMI), and body self-image was based on perceived weight. We tested associations between underweight and bullying victimization using three-level logistic regression models. Of the 213,595 adolescents investigated, 11.28% adolescents reported chronic bullying victimization, 14.80% were classified as overweight/obese according to age- and sex-specific BMI criteria, 12.97% were underweight, and 28.36% considered themselves a little bit fat or too fat, 14.57% were too thin. Bullying victimization was less common in older adolescent boys and girls. Weight status was associated with chronic bullying victimization (adjusted OR underweight = 1.10, 95% CI = 1.05-1.16, p = 0.002; adjusted OR overweight = 1.40, 95% CI = 1.32-1.49, p self-image also related to chronic bullying victimization (adjusted OR too thin = 1.42, 95% CI = 1.36-1.49, p self-rated overweight are associated with chronic bullying victimization. Both overweight and underweight children are at risk of being chronically bullied.

  14. Immunogenicity and Reactogenicity of DTPa-IPV/Hib Vaccine Co-administered With Hepatitis B Vaccine for Primary and Booster Vaccination of Taiwanese Infants

    Directory of Open Access Journals (Sweden)

    Pei-Lan Shao

    2011-06-01

    Full Text Available Immunogenicity and reactogenicity of the combined diphtheria-tetanus-acellular pertussis-inactivated poliovirus-Haemophilus influenzae type b (Hib conjugate vaccine (DTPa-IPV/Hib, Infanrix™-IPV + Hib was assessed when co-administered with hepatitis B (HBV vaccine. Seventy healthy infants received DTPa-IPV/Hib at 1.5, 3.5, 6 and 15–18 months, and HBV at birth, 1.5, 6 and 15–18 months of age. Serological responses were assessed. Diphtheria, tetanus, Hib and pertussis seroprotection/seropositivity rates were 100% after primary vaccination. Post-primary immune responses to poliovirus could not be evaluated for technical reasons. However, after the booster dose, seroprotection/seropositivity rates, including poliovirus, were 100%. Over 95% were seroprotected against HBV. Post-booster geometric mean antibody concentrations/titers (GMC/GMTs rose from 14-fold to 45-fold, indicating effective priming against all antigens, including polioviruses. DTPa-IPV/Hib was well tolerated alone or co-administered with HBV. No serious adverse events were considered related to vaccination. Primary and booster vaccination with combined DTPa-IPV/Hib and HBV was immunogenic and well tolerated. Combination vaccines enable vaccine providers to conveniently provide routine pediatric immunizations, with minimal discomfort.

  15. How to become a victim of crime

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-03-01

    Full Text Available Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1 the emergence of criminal threats; 2 increasing the degree of social vulnerability to criminal assault; 3 the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations; 4 increase the number of victims of crimes as registered and latent, which helps re-victimization of some of them. As a result of our Internet survey of more than 3002 people (2015 defined the proportion of citizens who every year are victims of crime. By 2015 it is 37 %. However, one in seven respondents already had experience of victimization before. In our view, there is a threshold of permissible viktymizovanosti population not exceeding 40 % and is independent of the level of crime in a calendar year or an. Typically, victims of crime every year are new faces. Re-victimization experiences 15 % of citizens. The risk of becoming a victim of crime depends on the accuracy and timeliness of recognition of sources and types of criminal threats. Showed a rather stereotypical ideas of the criminal threat and showed a disorientation in identifying their sources. The last mentioned some time. Traditionally people cautious attitude to strangers, suspicious issued and may bear criminal intent (62 %; alarming stay at poorly attended locations in the dark (67 % and likelihood of falling into unpredictable situations (44 %. Only 15% of respondents sees the source of victimization in their own dangerous behavior. While the public understanding of the sources of victimization are largely abstract and false character. So, to our knowledge, most people are afraid of violent crime (64 %, but actually experiencing mercenary crimes (60 %. In the context of what has been said quite expected the place called criminal

  16. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    INTRODUCTION: From the clinical forensic examination reports produced by the Department of Forensic Medicine, Department of Forensic Medicine, Faculty of Health Sciences, University of Copenhagen, Denmark, in 2007 concerning rape, attempted rape and sexual assault (RAS), circumstances were...... extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  17. Pupils as Victims of Peer Violence

    Directory of Open Access Journals (Sweden)

    Cvek Mihaela

    2013-11-01

    Full Text Available The school is an educational institution that has to provide appropriate control of adults over pupils, which they do. Nevertheless, violence cannot be avoided. Pupils encounter peer violence in different roles, as observers, victims, perpetrators, or both. The objective of our research was to examine how often pupils are victims of peer violence, and to what extent the latter depends on pupils’ gender and age. The results of the research made among pupils in the fifth, seventh, and eighth grades of various primary schools across Slovenia showed that 24.1 per cent of pupils had already been victims of peer violence. The ones that they tend to tell about such episodes are their parents. The results have also shown that school is really a place where violence is very common, and that psychological and verbal abuse are the most common types of violence used.

  18. Effects of PREPARE, a Multi-component, School-Based HIV and Intimate Partner Violence (IPV) Prevention Programme on Adolescent Sexual Risk Behaviour and IPV: Cluster Randomised Controlled Trial.

    Science.gov (United States)

    Mathews, Catherine; Eggers, Sander M; Townsend, Loraine; Aarø, Leif E; de Vries, Petrus J; Mason-Jones, Amanda J; De Koker, Petra; McClinton Appollis, Tracy; Mtshizana, Yolisa; Koech, Joy; Wubs, Annegreet; De Vries, Hein

    2016-09-01

    Young South Africans, especially women, are at high risk of HIV. We evaluated the effects of PREPARE, a multi-component, school-based HIV prevention intervention to delay sexual debut, increase condom use and decrease intimate partner violence (IPV) among young adolescents. We conducted a cluster RCT among Grade eights in 42 high schools. The intervention comprised education sessions, a school health service and a school sexual violence prevention programme. Participants completed questionnaires at baseline, 6 and 12 months. Regression was undertaken to provide ORs or coefficients adjusted for clustering. Of 6244 sampled adolescents, 55.3 % participated. At 12 months there were no differences between intervention and control arms in sexual risk behaviours. Participants in the intervention arm were less likely to report IPV victimisation (35.1 vs. 40.9 %; OR 0.77, 95 % CI 0.61-0.99; t(40) = 2.14) suggesting the intervention shaped intimate partnerships into safer ones, potentially lowering the risk for HIV.

  19. Support for victims of crime: Analysis of the VDS info and victim support service in 2010

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2011-01-01

    Full Text Available VDS info and victim support service is a victim support service, which was established in 2003 within the Victimology Society of Serbia. The service provides emotional support, information and, if necessary, referral to other relevant services, as well as witness support. The target group of the service are direct and indirect victims of all forms of crime, of both sexes, regardless of any personal characteristics. In addition, support is provided to victims in court, as well as to women victims of violence who are in prison. In most cases victim support is provided by volunteers who are trained to work with victims of crime. This paper analyzes the work of the service in 2010. Special attention is paid to the problems of workplace violence and domestic violence, which are the most common reasons for contacting the service. The aim of the paper is to present the work of the service in the past year, as well as to highlight the trends observed in comparison to the previous period.

  20. The Norwegian police and victims of elder abuse in close and familial relationships.

    Science.gov (United States)

    Aas, Geir

    2018-01-01

    Over recent decades, domestic violence or family violence, violence against women and child abuse has received much attention in the media, in political discourse and in social research. However, abuse of older adults arouses limited interest. In government action against domestic violence and in police guidance manuals, the elderly receive little attention. The aim of this article is primarily to demonstrate how the police attempt to prevent elder abuse in close relationships, especially in parent-child relationships. This article highlights some contradictions between the need of the police to produce criminal cases (often contrary to the interests of the victims) on the one hand, and the police's duty to prevent further abuse on the other. Research has documented that help and prevention measures in question make the situation even worse for the victims they are meant to help.

  1. Discrimination and victimization: parade for lesbian, gay, bisexual, and transgender (LGBT) pride, in Chile.

    Science.gov (United States)

    Barrientos, Jaime; Silva, Jimena; Catalan, Susan; Gomez, Fabiola; Longueira, Jimena

    2010-01-01

    This article describes the population participating in the LGBT Pride Parade in Santiago, Chile, from discrimination and victimization standpoints. The sample consisted of 488 subjects older than 18 years (M = 25.1), who were interviewed during the 2007 event. For this purpose, a questionnaire from the Latin American Centre of Sexuality and Human Rights (CLAM) was adapted and administered. Approximately 35% of respondents reported having experimented school, religious, or neighborhood discrimination. The more discriminated are transgender people. Approximately three fourths of respondents reported experiencing ridicule and almost 60% reported experiencing insults or threats. Transgender were significantly more likely than gay men, lesbians, and bisexuals to experience discrimination or victimization events. Finally, the parade acquired an important social and political character in the context of a clearly homophobic society.

  2. Peer Victimization and Dating Violence Victimization: The Mediating Role of Loneliness, Depressed Mood, and Life Satisfaction.

    Science.gov (United States)

    Cava, María-Jesús; Buelga, Sofía; Tomás, Inés

    2018-03-01

    Peer victimization and dating violence victimization have serious negative effects on adolescents' health, and they seem to be related. However, the mediating processes in this relationship have not been sufficiently analyzed. The purpose of this study was to analyze the direct and indirect relationships between peer victimization and dating violence victimization, considering the possible mediator role of loneliness, depressed mood, and life satisfaction. These relationships are analyzed in boys and girls, and in early and middle adolescence. From an initial sample of 1,038 Spanish adolescents, those who had or had had in the past 12 months a dating relationship (647 adolescents; 49.1% boys, M = 14.38, SD = 1.43) were included in this study. Multigroup structural equation modeling was used to test a double mediation model simultaneously for boys and girls, testing the invariance of the relationships among variables across genders. The same technique was used to test the model simultaneously for early and middle adolescence, testing the invariance of the relationships among variables across age groups. Results revealed a positive direct relationship between peer victimization and dating violence victimization, as well as the partial mediating role of loneliness and life satisfaction in this relationship. The mediator role of depressed mood was not supported. The same mediational model was confirmed in boys and girls, and in early and middle adolescence. These results highlight the important role of loneliness and life satisfaction to explain the link between peer victimization and dating violence victimization in adolescence. These findings may be useful for developing intervention programs aimed at preventing situations of multiple victimization during adolescence.

  3. Bullying and victimization in elementary schools : A comparison of bullies, victims, bully/victims, and uninvolved preadolescents

    NARCIS (Netherlands)

    Veenstra, René; Lindenberg, Siegwart; Oldehinkel, Albertine J.; Winter, Andrea F. de; Verhulst, Frank C.; Ormel, Johan

    Research on bullying and victimization largely rests on univariate analyses and on reports from a single informant. Researchers may thus know too little about the simultaneous effects of various independent and dependent variables, and their research may be biased by shared method variance. The

  4. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight cell - Update II

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    An update of validation test results confirming the breakthrough in LEO cycle life of nickel-hydrogen cells containing 26 percent KOH electrolyte is presented. A breakthrough in the LEO cycle life of individual pressure vessel (IPV) nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles, compared to 3500 cycles for cells containing 31 percent KOH. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min discharge (2X normal rate). The depth-of-discharge was 80 percent. Six 48-Ah Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells), and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The three 31 percent KOH cells failed (cycles 3729, 4165, and 11355). One of the 26 percent KOH cells failed at cycle 15314. The other two 26 percent KOH cells were cycled for over 16,000 cycles during the continuing test.

  5. An Exploratory Study Using Cortisol to Describe the Response of Incarcerated Women IPV Survivors to MAMBRA Intervention

    Directory of Open Access Journals (Sweden)

    Janette Y. Taylor

    2016-01-01

    Full Text Available Objective. To determine if incarcerated women survivors of IPV had a physiological response to the Music and Account-Making for Behavioral-Related Adaptation (MAMBRA intervention, as measured by cortisol levels. Methods. A single-group repeated measures designed exploratory study was used to pilot-test MAMBRA. A convenience sample (n=33 was recruited in a Midwestern women’s correctional facility. Serving as their own control, participants provided demographics and pre-/post-MAMBRA salivary samples while attending four MAMBRA sessions. Baseline data were compared to participants’ data collected over the remaining 3 MAMBRA sessions. Data were analyzed with descriptive and univariate statistics with an alpha of .05 and post-hoc power of .65. Results. Participants were predominantly White (52%, single (80%, and early middle-aged (x-AGE=38.7±9.4, with a history of physical/nonphysical spousal abuse. Using a subsample (n=26, salivary cortisol decreased between the pre-/post-MAMBRA over the sessions (F(3,75=4.59, p<.01. Conclusion. Participants had a physiological response to the MAMBRA intervention as evidenced by the decreased cortisol between the pre-/post-MAMBRA. This is the first step in examining MAMBRA’s clinical utility as an intervention for female IPV survivors. Future longitudinal studies will examine MAMBRA’s effectiveness given this change in cortisol.

  6. Preventing gender-based violence victimization in adolescent girls in lower-income countries: Systematic review of reviews.

    Science.gov (United States)

    Yount, Kathryn M; Krause, Kathleen H; Miedema, Stephanie S

    2017-11-01

    This systematic review of reviews synthesizes evidence on the impact of interventions to prevent violence against adolescent girls and young women 10-24 years (VAWG) in low- and middle-income countries (LMICs). Theories of women's empowerment and the social ecology of multifaceted violence frame the review. Child abuse, female genital mutilation/cutting (FGMC), child marriage, intimate partner violence (IPV), and sexual violence were focal outcomes. Our review followed the Assessment of Multiple Systematic Reviews (AMSTAR) for the systematic review of reviews, and the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) for a systematic review of recent intervention studies. Of 35 reviews identified between June 7 and July 20, 2016, 18 were non-duplicate systematic reviews of medium-to-high quality. Half of these 18 reviews focused on interventions to prevent IPV. Only four focused on adolescents, of which three focused on child marriage and one compared findings across early and late adolescence. None focused on interventions to prevent child abuse or sexual violence in adolescent/young women. From these 18 reviews and the supplemental systematic review of intervention studies, data were extracted on 34 experimental or quasi-experimental intervention studies describing 28 interventions. Almost all intervention studies measured impacts on one form of VAWG. Most studies assessed impacts on child marriage (n = 13), then IPV (n = 8), sexual violence (n = 4), child abuse (n = 3), and FGMC (n = 3). Interventions included 1-6 components, involving skills to enhance voice/agency (n = 17), social networks (n = 14), human resources like schooling (n = 10), economic incentives (n = 9), community engagement (n = 11) and community infrastructure development (n = 6). Bundled individual-level interventions and multilevel interventions had more favorable impacts on VAWG. Interventions involving community engagement, skill-building to

  7. A latent class analysis of bullies, victims and aggressive victims in Chinese adolescence: relations with social and school adjustments.

    Directory of Open Access Journals (Sweden)

    Aihui Shao

    Full Text Available This study used the latent class analysis (LCA to identify and classify Chinese adolescent children's aggressive behaviors. It was found that (1 Adolescent children could be divided into four categories: general children, aggressive children, victimized children and aggressive victimized children. (2 There were significant gender differences among the aggressive victimized children, the aggressive children and the general children. Specifically, aggressive victimized children and aggressive children had greater probabilities of being boys; victimized children had equal probabilities of being boys or girls. (3 Significant differences in loneliness, depression, anxiety and academic achievement existed among the aggressive victims, the aggressor, the victims and the general children, in which the aggressive victims scored the worst in all questionnaires. (4 As protective factors, peer and teacher supports had important influences on children's aggressive and victimized behaviors. Relative to general children, aggressive victims, aggressive children and victimized children had lower probabilities of receiving peer supports. On the other hand, compared to general children, aggressive victims had lower probabilities of receiving teacher supports; while significant differences in the probability of receiving teacher supports did not exist between aggressive children and victimized children.

  8. Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization

    OpenAIRE

    Erdinc Ozturk; Gizem Akcan

    2016-01-01

    Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...

  9. The Victim Handling Model of Human Trafficking Through Economic Independence

    OpenAIRE

    Nuraeny, Henny; Utami, Tanti Kirana

    2016-01-01

    Human Trafficking is a modern trading of human slavery. Human Trafficking is also one of the worst forms of violation of human dignity that results in trauma to the victims. To that end, there should be a comprehensive treatment for victims. The problems that can be studied is whether a model that can be applied in the treatment of victims of trafficking in Cianjur and disseminating technical how models Handling of Victims of Human Trafficking in Cianjur. This study used normative juridical a...

  10. Prevalence of bullying and victimization among children in early elementary school: Do family and school neighbourhood socioeconomic status matter?

    Directory of Open Access Journals (Sweden)

    Jansen Pauline W

    2012-07-01

    Full Text Available Abstract Background Bullying and victimization are widespread phenomena in childhood and can have a serious impact on well-being. Children from families with a low socioeconomic background have an increased risk of this behaviour, but it is unknown whether socioeconomic status (SES of school neighbourhoods is also related to bullying behaviour. Furthermore, as previous bullying research mainly focused on older children and adolescents, it remains unclear to what extent bullying and victimization affects the lives of younger children. The aim of this study is to examine the prevalence and socioeconomic disparities in bullying behaviour among young elementary school children. Methods The study was part of a population-based survey in the Netherlands. Teacher reports of bullying behaviour and indicators of SES of families and schools were available for 6379 children aged 5–6 years. Results One-third of the children were involved in bullying, most of them as bullies (17% or bully-victims (13%, and less as pure victims (4%. All indicators of low family SES and poor school neighbourhood SES were associated with an increased risk of being a bully or bully-victim. Parental educational level was the only indicator of SES related with victimization. The influence of school neighbourhood SES on bullying attenuated to statistical non-significance once adjusted for family SES. Conclusions Bullying and victimization are already common problems in early elementary school. Children from socioeconomically disadvantaged families, rather than children visiting schools in disadvantaged neighbourhoods, have a particularly high risk of involvement in bullying. These findings suggest the need of timely bullying preventions and interventions that should have a special focus on children of families with a low socioeconomic background. Future studies are necessary to evaluate the effectiveness of such programs.

  11. Funcionalidad, diseño, simulación y configuración de dispositivos para una red MPLS en entorno IPV6

    OpenAIRE

    Reyes Altamirano, Rolando Javier

    2014-01-01

    The final degree is intended to raise awareness of the operation, design, infrastructure elements, simulating a MPLS network in IPv6 environment due to high demand from users to the internet, increased smartphone devices, pc, tablet, high QoS, video conference, VoIP, data. MPLS is the dominant technology in the core of the network is able to open multiple paths between a source and a destination, and integrate multiple services for the same channel, this joined the IPV6 protocol that supplies...

  12. Racial and Ethnic Stereotypes and Bullying Victimization

    Science.gov (United States)

    Peguero, Anthony A.; Williams, Lisa M.

    2013-01-01

    Bullying is a serious problem within the U.S. school system. Prior research suggests that victimization is stratified by race and ethnicity. However, few studies consider factors that may moderate this relationship. This article extends research on this topic by considering whether stereotypes moderate bullying among racial and ethnic youth. Youth…

  13. Teenagers as Victims in the Press

    Science.gov (United States)

    Andersson, Gunvor; Lundstrom, Tommy

    2007-01-01

    Research into press reporting on young people has tended to concentrate on young people as offenders. In contrast, this article focuses on press coverage of teenagers as victims. Reports in two Swedish newspapers (a morning broadsheet and an evening tabloid) were studied over a period of four months and subjected to a qualitative analysis of…

  14. Psychological distress among adolescents victims of cyberbullying

    Directory of Open Access Journals (Sweden)

    Jessica Ortega-Barón

    2017-07-01

    Full Text Available The information and communication technologies have rapidly been incorporated and expanded in our society. The age in which children and adolescents get access to electronic devices is decreasing. These devices have big advantages, but they can also be inappropriately used to molest and intimidate other children and, as a result, to cause severe psychological problems to other children. Taking this into consideration, the main objective of this study has been to describe the psychological distress shown by adolescents suffering from cyberbullying. In order to do this, the following variables were registered: depressive symptomatology, perceived stressed, isolation and life satisfaction. The initial sample was formed by 1360 adolescents. From these, 194 from 11 to 18 years old (M = 14.22, SD = 1.81 were selected according to their scores in cybervictimization (43.8 % boys. Participants were divided into three groups according to how intense their cyberbullying victimization was. These were: mild, moderated and severe. Our findings show that there were statistically significant differences between mild and severe victims. Adolescents who were severe cyberbullying victims scored higher in depressive symptomatology and perceived stress, and lower in life satisfaction compared to mild cyberbullying victims. These results and their implications are discussed in order to propose future strategies to prevent cyberbullying.

  15. Simulating Peer Support for Victims of Cyberbullying

    NARCIS (Netherlands)

    Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.

    2010-01-01

    This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future

  16. Treating the Adolescent Victim-Turned-Offender.

    Science.gov (United States)

    Muster, Nori J.

    1992-01-01

    Many juvenile sex offenders are also victims of sexual abuse. Treatment primarily focuses on juvenile's criminal acts in confrontational, nonsympathetic manner. Surveyed 18 professionals in sexual abuse treatment field to assess attitudes toward juvenile sex offender treatment. Those in corrections field were greatest supporters of confrontational…

  17. The Perception of Cyberbullying in Adolescent Victims

    Science.gov (United States)

    Sevcikova, Anna; Smahel, David; Otavova, Mlada

    2012-01-01

    The goal of this study was to explore how victims of cyberbullying perceive online aggressive attacks and when they see them as harmful. Interviews were carried out with 16 cybervictimised participants aged 15-17 years. The findings showed differences in the perception of online victimisation when perpetrated by an anonymous Internet user versus…

  18. Always the victim : Israel's present wars

    NARCIS (Netherlands)

    Reinhart, T.

    2006-01-01

    In the Israeli discourse, Israel has always been the innocent victim of vicious aggression from its neighbors. This perception of reality has only intensified with its two recent wars - against the Palestinians in Gaza and against Lebanon. On this view, in both cases Israel has manifested its good

  19. The Other Victims of the Nazis.

    Science.gov (United States)

    Friedman, Ina R.

    1995-01-01

    Maintains that, 50 years after World War II, few people are aware that Jews were not the only Nazi victims. Describes Nazi persecution against Gypsies, homosexuals, blacks, political dissenters, and other groups. Contends that every new generation of students should learn about the devastating effects of prejudice. (CFR)

  20. Internet piracy and consequences for victims

    Directory of Open Access Journals (Sweden)

    Savić Miljan

    2016-01-01

    Full Text Available After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total social cost of piracy. However, there are other categories of victims, such as those whose honor was besmirched as a result of piracy, and who suffer the consequences in the form of negative emotional reactions, loss of job as well as those who subsequently commit suicide. The object of this paper is to describe the effects of internet piracy on the victims of this phenomenon, and the goal is the analysis of the various direct and indirect effects of piracy on victims and their motivation for future creation, as well as analysis of prevention measures, with special emphasis on the Republic of Serbia.

  1. Global Human Trafficking and Child Victimization.

    Science.gov (United States)

    Greenbaum, Jordan; Bodrick, Nia

    2017-12-01

    Trafficking of children for labor and sexual exploitation violates basic human rights and constitutes a major global public health problem. Pediatricians and other health care professionals may encounter victims who present with infections, injuries, posttraumatic stress disorder, suicidality, or a variety of other physical or behavioral health conditions. Preventing child trafficking, recognizing victimization, and intervening appropriately require a public health approach that incorporates rigorous research on the risk factors, health impact, and effective treatment options for child exploitation as well as implementation and evaluation of primary prevention programs. Health care professionals need training to recognize possible signs of exploitation and to intervene appropriately. They need to adopt a multidisciplinary, outward-focused approach to service provision, working with nonmedical professionals in the community to assist victims. Pediatricians also need to advocate for legislation and policies that promote child rights and victim services as well as those that address the social determinants of health, which influence the vulnerability to human trafficking. This policy statement outlines major issues regarding public policy, medical education, research, and collaboration in the area of child labor and sex trafficking and provides recommendations for future work. Copyright © 2017 by the American Academy of Pediatrics.

  2. The Adolescent Victim of Crime and Delinquency.

    Science.gov (United States)

    Flowers, R. Barri

    Child maltreatment and juvenile delinquency have both been widely studied. While statistics on the number of cases of abuse or delinquency are quite high, they are considered conservative, and estimates of actual as opposed to reported cases are much higher. There are striking parallels between adolescent victimization and adolescent antisocial…

  3. Race, Ethnicity, and Adolescent Violent Victimization.

    Science.gov (United States)

    Tillyer, Marie Skubak; Tillyer, Rob

    2016-07-01

    The risk of adolescent violent victimization in the United States varies considerably across racial and ethnic populations; it is unknown whether the sources of risk also vary by race and ethnicity. This study examined the correlates of violent victimization for White, Black, and Hispanic youth. Data collected from 11,070 adolescents (51 % female, mean age = 15.04 years) during the first two waves of the National Longitudinal Study of Adolescent to Adult Health were used to estimate group-specific multilevel logistic regression models. The results indicate that male, violent offending, peer deviance, gang membership, and low self-control were significantly associated with increased odds of violent victimization for all groups. Some activities-including getting drunk, sneaking out, and unstructured socializing with peers-were risk factors for Black adolescents only; skipping school was a risk factor only for Hispanic adolescents. Although there are many similarities across groups, the findings suggest that minority adolescents are particularly vulnerable to violent victimization when they engage in some activities and minor forms of delinquency.

  4. Violence Exposure and Victimization among Rural Adolescents

    Science.gov (United States)

    Mykota, David B.; Laye, Adele

    2015-01-01

    Violence exposure is a serious public health concern for adolescents in schools today. Violence exposure can be quite severe and frequent with multiple acts of indirect and direct victimization having lasting effects on the physical, emotional, and intellectual well-being of adolescents. The purpose of the present study is to examine the rates of…

  5. [Minor Victims of Violent Acts in the Context of the Victim Reparation Law].

    Science.gov (United States)

    Hellwig, Katharina; Kröger, Christoph; Franke, Stefanie; Wehrmeyer, Matthias; Heinrichs, Nina

    2018-03-01

    A descriptive analysis of victim compensation applications for children and adolescents as well as sociodemographic and trauma-specific information concerning victims and perpetrators. We did analysis of 100 victim-compensation application files based on a self-developed category system. The files included solely interpersonal trauma, 59 % of which are type II trauma. The most frequent form is sexual violence. The perpetrators stem mostly from children’s homes or peripherals. 79 % of the victims received a diagnosis of a mental disorder, most often posttraumatic stress disorder. Sexually abused children and adolescents make up the majority of the target population in OEG-related trauma outpatient units. Such outpatient units should therefore offer a specific expertise in treating sexually abused children and adolescents.

  6. Victim derogation and victim enhancement as alternate routes to system justification.

    Science.gov (United States)

    Kay, Aaron C; Jost, John T; Young, Sean

    2005-03-01

    Abstract-Numerous studies have documented the potential for victim-blaming attributions to justify the status quo. Recent work suggests that complementary, victim-enhancing stereotypes may also increase support for existing social arrangements. We seek to reconcile these seemingly contradictory findings by proposing that victim derogation and victim enhancement are alternate routes to system justification, with the preferred route depending on the perception of a causal link between trait and outcome. Derogating "losers" (and lionizing "winners") on traits (e.g., intelligence) that are causally related to outcomes (e.g., wealth vs. poverty) serves to increase system justification, as does compensating "losers" (and downgrading "winners") on traits (e.g., physical attractiveness) that are causally unrelated to those outcomes. We provide converging evidence using system-threat and stereotype-activation paradigms.

  7. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  8. Social Information Processing Mechanisms and Victimization: A Literature Review.

    Science.gov (United States)

    van Reemst, Lisa; Fischer, Tamar F C; Zwirs, Barbara W C

    2016-01-01

    The aim of the current literature review, which is based on 64 empirical studies, was to assess to what extent mechanisms of the Social Information Processing (SIP) model of Crick and Dodge (1994) are related to victimization. The reviewed studies have provided support for the relation between victimization and several social information processing mechanisms, especially the interpretation of cues and self-efficacy (as part of the response decision). The relationship between victimization and other mechanisms, such as the response generation, was only studied in a few articles. Until now research has often focused on just one step of the model, instead of attempting to measure the associations between multiple mechanisms and victimization in multivariate analyses. Such analyses would be interesting to gain more insight into the SIP model and its relationship with victimization. The few available longitudinal studies show that mechanisms both predict victimization (internal locus of control, negative self-evaluations and less assertive response selection) and are predicted by victimization (hostile attribution of intent and negative evaluations of others). Associations between victimization and SIP mechanisms vary across different types and severity of victimization (stronger in personal and severe victimization), and different populations (stronger among young victims). Practice could focus on these stronger associations and the interpretation of cues. More research is needed however, to investigate whether intervention programs that address SIP mechanisms are suitable for victimization and all relevant populations. © The Author(s) 2014.

  9. Relations among School Connectedness, Hope, Life Satisfaction, and Bully Victimization

    Science.gov (United States)

    You, Sukkyung; Furlong, Michael J.; Felix, Erika; Sharkey, Jill D.; Tanigawa, Diane; Green, Jennifer Greif

    2008-01-01

    This study investigates the role of school connectedness in mediating the relation between students' sense of hope and life satisfaction for three groups: Bullied Victims, Peer Victims, and Nonvictims. Students in grades 5 to 12 (N = 866) completed the California Bully/Victim Scale, School Connectedness Scale, Children's Hope Scale, and Students'…

  10. Secrecy and persistent problems in sexual assault victims.

    NARCIS (Netherlands)

    Ensink, B.J.; Winkel, F.W.; Berlo, van W.

    2001-01-01

    A substantial number of victims of sexual assault refrain from disclosing to others the victimizing episode and its emotional consequences. A prospective study (n = 36 rape victims reporting theirvictimization to the police) and a retrospective study (n = 33) were conducted to examine the

  11. Do Social Relationships Protect Victimized Children against Internalizing Problems?

    Science.gov (United States)

    Averdijk, Margit; Eisner, Manuel; Ribeaud, Denis

    2014-01-01

    We investigated whether social relationships protect children against the effects of victimization on internalizing problems. We used data from the Zurich Project on the Social Development of Children and Youths. Victimization at age 8 years was associated with internalizing problems at age 9 years. Victims who had siblings, warm parents, and a…

  12. Professionals' conduct as a condition for minimizing secondary victimization of the victims of spouse abuse

    Directory of Open Access Journals (Sweden)

    Ignjatović Tanja

    2009-01-01

    Full Text Available Through analysis of the 'administrative' aspects of experts' documentation kept by three services in one local community - the police station, the center for social welfare and the primary health care center, the possibility of reducing victimization of victims of partnership violence within the family is the subject of consideration. The results of the analysis point to the necessity of rationalization and standardization of recording and procedures by the professionals.

  13. ANOTHER "LETHAL TRIAD"-RISK FACTORS FOR VIOLENT INJURY AND LONG-TERM MORTALITY AMONG ADULT VICTIMS OF VIOLENT INJURY.

    Science.gov (United States)

    Laytin, Adam D; Shumway, Martha; Boccellari, Alicia; Juillard, Catherine J; Dicker, Rochelle A

    2018-04-14

    Mental illness, substance abuse, and poverty are risk factors for violent injury, and violent injury is a risk factor for early mortality that can be attenuated through hospital-based violence intervention programs. Most of these programs focus on victims under the age of 30 years. Little is known about risk factors or long-term mortality among older victims of violent injury. To explore the prevalence of risk factors for violent injury among younger (age < 30 years) and older (age 30 ≥ years) victims of violent injury, to determine the long-term mortality rates in these age groups, and to explore the association between risk factors for violent injury and long-term mortality. Adults with violent injuries were enrolled between 2001 and 2004. Demographic and injury data were recorded on enrollment. Ten-year mortality rates were measured. Descriptive analysis and logistic regression were used to compare older and younger subjects. Among 541 subjects, 70% were over age 30. The overall 10-year mortality rate was 15%, and was much higher than in the age-matched general population in both age groups. Risk factors for violent injury including mental illness, substance abuse, and poverty were prevalent, especially among older subjects, and were each independently associated with increased risk of long-term mortality. Mental illness, substance abuse, and poverty constitute a "lethal triad" that is associated with an increased risk of long-term mortality among victims of violent injury, including both younger adults and those over age 30 years. Both groups may benefit from targeted risk-reduction efforts. Emergency department visits offer an invaluable opportunity to engage these vulnerable patients. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. Observer reactions to emotional victims of serious crimes : Stereotypes and expectancy violations

    NARCIS (Netherlands)

    Bosma, Alice; Mulder, Eva; Pemberton, Antony; Vingerhoets, Ad

    2018-01-01

    Negative observer reactions towards victims may be related to people’s expectations of the characteristics and demeanor of an ideal victim. We examined how expressed emotion, victim sex, and type of victimization influence observers’ perceptions of victim credibility, victim character, and harm. Our

  15. Revictimization of Victims Sexually Abused by Women

    Directory of Open Access Journals (Sweden)

    Małgorzata H. Kowalczyk

    2017-07-01

    Full Text Available Victims experiencing the sexual abuse are surviving not only physical injustice but above all deep traumas, which very often in different forms, are keeping them company through the entire life. Quite often at establishing different results a sex is underestimated for the perpetrator. Therefore knowing the problem of sexual abuses from a perspective of close as well as distant results is very important in the event that a woman was a perpetrator of these acts – mother, minder. In the present article based on analysis of literature, a problem of results of the sexual abuse was presented at victims which experienced these behaviours on the part of women. In order to draw up discussing the survived specificity by victims was both of sex of the trauma connected with the sexual application as well as close and distant consequences of these events in the form prime victimisation and revictimisation for figure being noticeable in the adult life of psychosexual disorders and social shortages. Amongst the consequence isolated traumatic factors are deserving the particular attention about dynamic character which are provoking the appearance of many symptoms characteristic of children which experienced the sexual violence. Recalled factors it: traumatic sexualisation of child, the betrayal, the stigmatization and the helplessness. The specificity of these factors results from the fact that they will leave distant “tracks” in the psyche and they can undergo the additional reinforcement if a woman is a perpetrator of the sexual violence. It results from frequent attitudes of “denying” towards the sexual violence applied by women. In the study they pointed also at one of possible consequences of the revictimisation process copying patterns of behaviour connected with the sexual exploitation of children in their more late life by victims is which. This process resulting from the alternating identification of the perpetrator and the victim is starting

  16. Decreases in the proportion of bullying victims in the classroom: Effects on the adjustment of remaining victims

    NARCIS (Netherlands)

    Garandeau, C.F.; Lee, Ihno A.; Salmivalli, Christina

    2018-01-01

    Sharing a classroom environment with other victimized peers has been shown to mitigate the adverse effects of peer victimization on children’s social and psychological adjustment. By extension, this study hypothesized that classroom reductions in the proportion of victims would be harmful for

  17. Vial usage, device dead space, vaccine wastage, and dose accuracy of intradermal delivery devices for inactivated poliovirus vaccine (IPV).

    Science.gov (United States)

    Jarrahian, Courtney; Rein-Weston, Annie; Saxon, Gene; Creelman, Ben; Kachmarik, Greg; Anand, Abhijeet; Zehrung, Darin

    2017-03-27

    Intradermal delivery of a fractional dose of inactivated poliovirus vaccine (IPV) offers potential benefits compared to intramuscular (IM) delivery, including possible cost reductions and easing of IPV supply shortages. Objectives of this study were to assess intradermal delivery devices for dead space, wastage generated by the filling process, dose accuracy, and total number of doses that can be delivered per vial. Devices tested included syringes with staked (fixed) needles (autodisable syringes and syringes used with intradermal adapters), a luer-slip needle and syringe, a mini-needle syringe, a hollow microneedle device, and disposable-syringe jet injectors with their associated filling adapters. Each device was used to withdraw 0.1-mL fractional doses from single-dose IM glass vials which were then ejected into a beaker. Both vial and device were weighed before and after filling and again after expulsion of liquid to record change in volume at each stage of the process. Data were used to calculate the number of doses that could potentially be obtained from multidose vials. Results show wide variability in dead space, dose accuracy, overall wastage, and total number of doses that can be obtained per vial among intradermal delivery devices. Syringes with staked needles had relatively low dead space and low overall wastage, and could achieve a greater number of doses per vial compared to syringes with a detachable luer-slip needle. Of the disposable-syringe jet injectors tested, one was comparable to syringes with staked needles. If intradermal delivery of IPV is introduced, selection of an intradermal delivery device can have a substantial impact on vaccine wasted during administration, and thus on the required quantity of vaccine that needs to be purchased. An ideal intradermal delivery device should be not only safe, reliable, accurate, and acceptable to users and vaccine recipients, but should also have low dead space, high dose accuracy, and low overall

  18. Analyzed immunogenicity of fractional doses of Sabin-inactivated poliovirus vaccine (sIPV) with intradermal delivery in rats.

    Science.gov (United States)

    Ma, Lei; Cai, Wei; Sun, Mingbo; Cun, Yina; Zhou, Jian; Liu, Jing; Hu, Wenzhu; Zhang, Xinwen; Song, Shaohui; Jiang, Shude; Liao, Guoyang

    2016-12-01

    The live-attenuated oral polio vaccine (OPV) will be no longer used when wild poliovirus (WPV) eliminating in worldwide, according to GPEI (the Global Polio Eradication Initiative) Reports. It is planning to replace OPV by Sabin-based inactivated poliovirus vaccine (sIPV) in developing countries, with purpose of reducing of the economic burden and maintaining of the appropriate antibody levels in population. It studied serial fractional doses immunized by intradermal injection (ID) in rats, to reduce consume of antigen and financial burden, maintaining sufficient immunogenicity; Methods: Study groups were divided in 4 groups of dose gradient, which were one-tenth (1/10), one-fifth (1/5), one-third (1/3) and one-full dose (1/1), according to the volume of distribution taken from the same batch of vaccine (sIPV). Wistar rats were injected intradermally with the needle and syringe sing the mantoux technique taken once month for 3 times. It was used as positive control that intramuscular inoculation (IM) was injected with one-full dose (1/1) with same batch of sIPV. PBS was used as negative control. Blood samples were collected via tail vein. After 30 d with 3 round of immunization, it analyzed the changes of neutralization antibody titers in the each group by each immunization program end; Results: The results of seroconversion had positive correlation with different doses in ID groups. The higher concentration of D-antigen (D-Ag) could conduct higher seroconversion. Furthermore, different types of viruses had different seroconversion trend. It showed that the geometric mean titers (GMTs) of each fractional-dose ID groups increased by higher concentration of D-Ag, and it got significant lower than the full-dose IM group. At 90 th days of immunization, the GMTs for each poliovirus subtypes of fractional doses were almost higher than 1:8, implied that it could be meaning positive seroprotection titer for polio vaccine types, according to WHO suggestion; Conclusions

  19. The reciprocal relationship between sexual victimization and sexual assertiveness.

    Science.gov (United States)

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  20. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  1. [Health status and intimate partner violence].

    Science.gov (United States)

    Sanz-Barbero, Belén; Rey, Lourdes; Otero-García, Laura

    2014-01-01

    To describe the prevalence of intimate partner violence (IPV) in Spain in the last year and at some point during the lifetime, to determine health status in women according to whether they had experienced IPV or not, and to analyze the individual variables associated with IPV in Spain. A cross-sectional study was performed of the database, Macrosurvey on Gender Violence in Spain 2011. This database includes data on 7,898 women older than 18 years old. The dependent variables were IPV-last year, IPV-ever in life. Covariates consisted of sociodemographic characteristics, socioeconomic status, maternal experience of IPV, social support, and self-care. The measure of association used was the OR with its 95% confidence interval (95% CI). A total of 3.6% of women had experienced IPV-last year and 12.2% ever in life. Female victims of IPV had poorer health than women who had not experienced IPV. Immigrant women living in Spain for 6 years or more were more likely to experience IPV-ever in life than Spanish women [OR (95% CI): 1.95 (1.50, 2.53)]. An interaction was found between nationality and the existence of children under 18 years old. Among women with children under 18 years old, immigrant women were more likely to experience IPV-last year than Spanish women [OR (95% CI): 1.99 (1.25, 3.17)]. Other variables associated with IPV were age, low socioeconomic status, low social support and having a mother who had experienced IPV. In Spain, some women have a higher probability of experiencing IPV. The variables associated with greater vulnerability to IPV should be taken into account when implementing measures to prevent or alleviate IPV. Copyright © 2013 SESPAS. Published by Elsevier Espana. All rights reserved.

  2. Victims of crime, with special emphasis on victims of work abuse and domestic violence: Analysis of the service VDS info and victim support for 2009

    Directory of Open Access Journals (Sweden)

    Radaković Danica

    2010-01-01

    Full Text Available The aim of this paper is to present the work of the VDS info and victim support service for the period January 1st 2009 - December 31st 2009. It contains the data about victims, type and quality of assistance and support provided by the Service, and also about institutions and organizations the victims contacted before or after contacting the Service and their satisfaction with the help they received.

  3. Behavioral and Mental Health Correlates of Youth Stalking Victimization

    Science.gov (United States)

    Reidy, Dennis E.; Smith-Darden, Joanne P.; Kernsmith, Poco D.

    2018-01-01

    Introduction Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. Methods A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Results Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. Conclusions These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. PMID:27743623

  4. Child victims and poly-victims in China: are they more at-risk of family violence?

    Science.gov (United States)

    Chan, Ko Ling

    2014-11-01

    Multiple forms of violence may co-occur on a child. These may include various forms of child victimization and different types of family violence. However, evidence that child victims are more likely to witness other types of family violence has been lacking in China. Using data of a large and diverse sample of children recruited from 6 regions in China during 2009 and 2010 (N=18,341; 47% girls; mean age=15.9 years), the associations between child victimization and family violence witnessed were examined. Descriptive statistics and the associations between child victimization, demographic characteristics, and family violence witnessed were analyzed. Lifetime and preceding-year rates were 71.7% and 60.0% for any form of child victimization and 14.0% and 9.2% for poly-victimization (having four or more types of victimization), respectively. Family disadvantages (i.e., lower socio-economic status, single parents, and having more than one child in the family) were associated with child victimization and poly-victimization. Witnessing of parental intimate partner violence, elder abuse, and in-law conflict also increased the likelihood of child victimization and poly-victimization, even after the adjustment of demographic factors. Possible mechanisms for the links between family violence and child victimization are discussed. The current findings indicated the need for focusing on the whole family rather than the victim only. For example, screening for different types of family violence when child victims are identified may help early detection of other victims within the family. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization.

    Science.gov (United States)

    Hamby, Sherry; Blount, Zach; Smith, Alli; Jones, Lisa; Mitchell, Kimberly; Taylor, Elizabeth

    2018-01-01

    Many forms of victimization, including bullying and property crime, are increasingly moving online, but most studies of poly-victimization still primarily focus on in-person crime and violence. Few studies have examined the importance of incorporating technology-based victimizations for assessing the true burden of violence. The purpose of this study is to explore whether digital poly-victimization contributes to post-traumatic stress and anxiety/dysphoria symptoms after controlling for in-person poly-victimization. Given that technology use and technology-based victimization are changing rapidly, a mixed methods approach was adopted. In the first two phases, focus groups and cognitive interviews (89 total participants) were used to identify the range of digital victimization and develop the Digital Poly-Victimization Scale. In the third phase, the new measure was included in a community survey (n = 478, 57.5% female; 62.6% earning under $50,000 per year) in a rural Southern region, along with measures of in-person poly-victimization, posttraumatic stress and anxiety/dysphoria symptoms, and other outcomes and personal characteristics. A comprehensive measure of digital poly-victimization indicated that almost 3 in 4 participants (72.3%) had experienced at least one form of digital victimization. The results indicated that digital poly-victimization contributed unique variance to post-traumatic stress and anxiety/dysphoria symptoms (p Digital victimization often presents fewer risks to perpetrators and can be expected to represent an increasing share of the societal burden of violence. Future research on poly-victimization should pay more attention to the role of digital victimization.

  6. Workplace mobbing: How the victim's coping behavior influences bystander responses.

    Science.gov (United States)

    Mulder, Roelie; Bos, Arjan E R; Pouwelse, Mieneke; van Dam, Karen

    2017-01-01

    Victims of workplace mobbing show diverse coping behavior. We investigated the impact of this behavior on bystander cognitions, emotions, and helping toward the victim, integrating coping literature with attribution theory. Adult part-time university students (N = 161) working at various organizations participated in a study with a 3(Coping: approach/avoidance/neutral) × 2(Gender Victim: male/female) × 2(Gender Bystander: male/female) design. Victims showing approach (vs. avoidance) coping were considered to be more self-reliant and less responsible for the continuation of the mobbing, and they elicited less anger. Continuation responsibility and self-reliance mediated the relationship between the victim's coping behavior and bystanders' helping intentions. Female (vs. male) participants reported more sympathy for the victim and greater willingness to help, and female (vs. male) victims elicited less anger. Theoretical and practical implications of the findings are discussed.

  7. PrECast: An Efficient Crypto-Free Solution for Broadcast-Based Attacks in IPv4 Networks

    Directory of Open Access Journals (Sweden)

    Dalal Hanna

    2018-05-01

    Full Text Available Broadcasting is one of the essential features in the Internet Protocol Ver 4 (IPv4. Attackers often exploit this feature of the IP protocol to launch several attacks against a network or an individual host. Attackers may either be a part of a Local Area Network (LAN or outside a LAN to launch these attacks. There are numerous papers available in the literature to solve problems resulting from IP broadcasting. However, all these solutions target a specific problem that results from IP broadcasting. Furthermore, these solutions use either a computationally-intensive cryptographic scheme, the a priori relation between the host and the network or a modified protocol stack at every host. In this paper, we provide a seamless and transparent solution to eliminate IP broadcasting and thus eliminate all problems related to IP broadcasting. Our proposed solution is crypto-free and does not need any modification to the protocol stack.

  8. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  9. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  10. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  11. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  12. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight cells-update 2

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1991-01-01

    An update of validation test results confirming the breakthrough in low earth orbit (LEO) cycle life of nickel-hydrogen cells containing 26 percent KOH electrolyte is presented. A breakthrough in the LEO cycle life of individual pressure vessel (IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40 000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. This test was conducted at Hughes Aircraft Company under a NASA Lewis contract. The purpose was to investigate the effect of KOH concentration on cycle life. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min discharge (2x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The boiler plate test results are in the process of being validated using flight hardware and real time LEO test at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. Six 48 Ah Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells), and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The three 31 percent KOH cells failed (cycles 3729, 4165, and 11355). One of the 26 percent KOH cells failed at cycle 15314. The other two 26 percent KOH cells were cycled for over 16600 cycles during the continuing test.

  13. [Violence and accidents among older and younger adults: evidence from the Surveillance System for Violence and Accidents (VIVA), Brazil].

    Science.gov (United States)

    Luz, Tatiana Chama Borges; Malta, Deborah Carvalho; Sá, Naíza Nayla Bandeira de; Silva, Marta Maria Alves da; Lima-Costa, Maria Fernanda

    2011-11-01

    Data from the Brazilian Surveillance System for Violence and Accidents (VIVA) in 2009 were used to examine socio-demographic characteristics, outcomes, and types of accidents and violence treated at 74 sentinel emergency services in 23 Brazilian State capitals and the Federal District. The analysis included 25,201 individuals aged > 20 years (10.1% > 60 years); 89.3% were victims of accidents and 11.9% victims of violence. Hospitalization was the outcome in 11.1% of cases. Compared to the general population, there were more men and non-white individuals among victims of accidents, and especially among victims of violence. As compared to younger adults (20-59 years), accidents and violence against elderly victims showed less association with alcohol, a higher proportion of domestic incidents, more falls and pedestrian accidents, and aggression by family members. Policies for the prevention of accidents and violence should consider the characteristics of these events in the older population.

  14. Perception of secondary victimization in gender violence

    Directory of Open Access Journals (Sweden)

    María Aranda López

    2014-08-01

    Full Text Available Gender violence is a complex phenomenon that does not end with the removal of the abuser, as the abused person can experience secondary victimization. This study examined this process in a sample of 38 battered women. A multicausal approach was used to assess satisfaction with health system, the police, and the judiciary. The study also assessed the role of two variables that have remained unaddressed: family support and perceived danger. The results indicate that dissatisfaction with judicial treatment and legal action plays a key role in the perception of secondary victimization. It was also found that women who perceive less risk value the judicial system more because they do not need the system to take protective measures or other measures for them. Moreover, women who receive family support are more satisfied with the police system.

  15. ASD and PTSD in Rape Victims

    DEFF Research Database (Denmark)

    Elklit, Ask; Christiansen, Dorte M

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims...... shortly after the rape or attempted rape. The PTSD diagnosis based solely on the three core symptom clusters was best identified by a subclinical ASD diagnosis based on all ASD criteria except dissociation. However, a full PTSD diagnosis including the A2 and F criteria was best identified by classifying...... on ASD severity and sexual problems following the rape accounted for only 28% of the PTSD severity variance. In conclusion, the ASD diagnosis is not an optimal method for identifying those most at risk for PTSD. It remains to be seen whether a better way can be found....

  16. Depression in Older Adults

    Science.gov (United States)

    ... here Home » Depression In Older Adults: More Facts Depression In Older Adults: More Facts Depression affects more ... combination of both. [8] Older Adult Attitudes Toward Depression: According to a Mental Health America survey [9] ...

  17. Cancer in Older Adults

    Science.gov (United States)

    ... Home > Navigating Cancer Care > For Older Adults For Older Adults A full-text transcript is available. More than ... Advanced Cancer For Children For Teens For Young Adults For Older Adults Aging and Cancer Cancer Care Decisions for ...

  18. Older Adults and Alcohol

    Science.gov (United States)

    ... Other Psychiatric Disorders Other Substance Abuse HIV/AIDS Older Adults A national 2008 survey found that about 40 ... of adults ages 65 and older drink alcohol. Older adults can experience a variety of problems from drinking ...

  19. Maladaptive schemas as mediators of the relationship between previous victimizations in the family and dating violence victimization in adolescents.

    Science.gov (United States)

    Calvete, Esther; Gámez-Guadix, Manuel; Fernández-Gonzalez, Liria; Orue, Izaskun; Borrajo, Erika

    2018-07-01

    This study examined whether exposure to family violence, both in the form of direct victimization and witnessing violence, predicted dating violence victimization in adolescents through maladaptive schemas. A sample of 933 adolescents (445 boys and 488 girls), aged between 13 and 18 (M = 15.10), participated in a three-year longitudinal study. They completed measures of exposure to family violence, maladaptive schemas of disconnection/rejection, and dating violence victimization. The findings indicate that witnessing family violence predicts the increase of dating violence victimization over time, through the mediation of maladaptive schemas in girls, but not in boys. Direct victimization in the family predicts dating violence victimization directly, without the mediation of schemas. In addition, maladaptive schemas contribute to the perpetuation of dating violence victimization over time. These findings provide new opportunities for preventive interventions, as maladaptive schemas can be modified. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Nurturer, Victim, Seductress: Gendered Roles in Terrorism

    Science.gov (United States)

    2018-04-20

    Becomes Her: The Changing Roles of Women’s Role in Terror." Georgetown Journal of International Affairs, Winter/Spring 2010: 91-98. ———. Dying to Kill...ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION . REPORT NUMBER Joint Forces Staff College Joint Advanced Warflghting School 7800 Hampton Blvd...STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL Nurturer, Victim, Seductress: Gendered Roles in

  1. Internet piracy and consequences for victims

    OpenAIRE

    Savić Miljan; Petrović Nikola M.

    2016-01-01

    After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total...

  2. A TODAY VICTIM OF SECOND WORLD WAR.

    Science.gov (United States)

    Hăisan, Anca; Dumea, Mihaela; Ursaru, Manuela; Bulat, C; Cimpoeşu, Diana Carmen

    2015-01-01

    Emergency medicine as a medical specialty has to deal with all kind of emergency situations, from medical to post traumatic acute eyents and from new born to the elderly persons, but also with particular situations like explosions. In Romania nowadays these are accidental explosions and rare like frequency, but may be dramatic due to numbers of victims and multisystem injury that may occur. We present a case of a single victim of accidental detonated bomb, a projectile from the Second World War, which unfortunately still may be found in some areas. The management of the case from first call to 112 until the victim is discharge-involves high professional team work. We use these opportunity to make a brief review of the mechanism through the lesions may appear and also to renew the fact that the most impressive lesion may not be the most severe, and we have to examine carefully in order to find the real life threatening injury of the patient.

  3. Parenting behavior and the risk of becoming a victim and a bully/victim: a meta-analysis study.

    Science.gov (United States)

    Lereya, Suzet Tanya; Samara, Muthanna; Wolke, Dieter

    2013-12-01

    Being bullied has adverse effects on children's health. Children's family experiences and parenting behavior before entering school help shape their capacity to adapt and cope at school and have an impact on children's peer relationship, hence it is important to identify how parenting styles and parent-child relationship are related to victimization in order to develop intervention programs to prevent or mitigate victimization in childhood and adolescence. We conducted a systematic review of the published literature on parenting behavior and peer victimization using MEDLINE, PsychINFO, Eric and EMBASE from 1970 through the end of December 2012. We included prospective cohort studies and cross-sectional studies that investigated the association between parenting behavior and peer victimization. Both victims and those who both bully and are victims (bully/victims) were more likely to be exposed to negative parenting behavior including abuse and neglect and maladaptive parenting. The effects were generally small to moderate for victims (Hedge's g range: 0.10-0.31) but moderate for bully/victims (0.13-0.68). Positive parenting behavior including good communication of parents with the child, warm and affectionate relationship, parental involvement and support, and parental supervision were protective against peer victimization. The protective effects were generally small to moderate for both victims (Hedge's g: range: -0.12 to -0.22) and bully/victims (-0.17 to -0.42). Negative parenting behavior is related to a moderate increase of risk for becoming a bully/victim and small to moderate effects on victim status at school. Intervention programs against bullying should extend their focus beyond schools to include families and start before children enter school. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Victim support services in England, Wales and Northern Ireland

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2002-01-01

    Full Text Available In the paper, authors tried to present activities of one of the oldest European Victim Support Services - Victim Support for England, Wales and Northern Ireland. During 1970s, through practice and research projects, the need for recognizing the physical and psychological status of victims after the crime was committed, as well as the need of providing them with the (informal assistance and support were noticed. That has resulted in establishing numerous of local victim support services (schemes, which united in the National Association of the Victim Support Services in 1979. Significant support was given to the Service in 1980s through the recommendations of the Council of Europe on the assistance for victims of crime and prevention of victimization through direct support given to the victim immediately after the incident, including protection and safety, medical, mental, social and financial support, as well as providing the victim with information on his/her rights, support during the criminal proceeding, assistance in getting compensation etc. Organization and structure of the service, referral system, code of practice and two main programs: Victim Service and Witness Service are reviewed in the paper.

  5. Network Exposure and Homicide Victimization in an African American Community

    Science.gov (United States)

    Wildeman, Christopher

    2014-01-01

    Objectives. We estimated the association of an individual’s exposure to homicide in a social network and the risk of individual homicide victimization across a high-crime African American community. Methods. Combining 5 years of homicide and police records, we analyzed a network of 3718 high-risk individuals that was created by instances of co-offending. We used logistic regression to model the odds of being a gunshot homicide victim by individual characteristics, network position, and indirect exposure to homicide. Results. Forty-one percent of all gun homicides occurred within a network component containing less than 4% of the neighborhood’s population. Network-level indicators reduced the association between individual risk factors and homicide victimization and improved the overall prediction of individual victimization. Network exposure to homicide was strongly associated with victimization: the closer one is to a homicide victim, the greater the risk of victimization. Regression models show that exposure diminished with social distance: each social tie removed from a homicide victim decreased one’s odds of being a homicide victim by 57%. Conclusions. Risk of homicide in urban areas is even more highly concentrated than previously thought. We found that most of the risk of gun violence was concentrated in networks of identifiable individuals. Understanding these networks may improve prediction of individual homicide victimization within disadvantaged communities. PMID:24228655

  6. Alcohol Involvement in Homicide Victimization in the U.S

    Science.gov (United States)

    Naimi, Timothy S.; Xuan, Ziming; Cooper, Susanna E.; Coleman, Sharon M.; Hadland, Scott E.; Swahn, Monica H.; Heeren, Timothy C.

    2016-01-01

    Background Although the association between alcohol and homicide is well documented, there has been no recent study of alcohol involvement in homicide victimization in U.S. states. The objective of this paper was to determine the prevalence of alcohol involvement in homicide victimization and identify socio-demographic and other factors associated with alcohol involvement in homicide victimization. Methods Data from homicide victims with a reported blood alcohol content (BAC) level were analyzed from 17 states from 2010–12 using the National Violent Death Reporting System. Logistic regression was used to investigate factors associated with the odds of homicide victims having a BAC ≥0.08%. Results Among all homicide victims, 39.9% had a positive BAC including 13.7% with a BAC between 0.01%–0.79% and 26.2% of victims with a BAC ≥0.08%. Males were twice as likely as females to have a BAC ≥0.08% (29.1% vs. 15.2%; p homicide victims having a BAC ≥0.08 included male sex, American Indian/Alaska Native race, Hispanic ethnicity, history of intimate partner violence, and non-firearm homicides. Conclusions Alcohol is present in a substantial proportion of homicide victims in the U.S., with substantial variation by state, demographic and circumstantial characteristics. Future studies should explore the relationships between state-level alcohol policies and alcohol-involvement among perpetrators and victims of homicide. PMID:27676334

  7. Childhood victimization experiences of young adults in St. Petersburg, Russia.

    Science.gov (United States)

    Bogolyubova, Olga; Skochilov, Roman; Smykalo, Lyubov

    2015-04-01

    The purpose of this study was to assess the prevalence of childhood victimization experiences in a sample of young adults in St. Petersburg, Russia. The study sample included 743 students aged 19 to 25 from 15 universities in St. Petersburg, Russia. All of the study participants completed a reliable questionnaire assessing the following types of childhood victimization: conventional crime, child maltreatment, peer victimization, sexual victimization, and witnessing violence. Participation in the study was anonymous. High rates of victimization and exposure to violence were reported by the study participants. The majority of the sample experienced at least one type of victimization during childhood or adolescence, and poly-victimization was reported frequently. The most common type of victimization reported was peer or sibling assault (66.94%), followed by witnessing an assault without weapon (63.91%), personal theft (56.19%), vandalism (56.06%), and emotional bullying (49.99%). Sexual assault by a known adult was reported by 1.45% males and 5.16% of females. This study provides new information on the scope of childhood victimization experiences in Russia. Further research is warranted, including epidemiological research with representative data across the country and studies of the impact of trauma and victimization on mental health and well-being of Russian adults and children. © The Author(s) 2014.

  8. The Association Between Familial Homelessness, Aggression, and Victimization Among Children.

    Science.gov (United States)

    Jetelina, Katelyn K; Reingle Gonzalez, Jennifer M; Cuccaro, Paula M; Peskin, Melissa F; Elliott, Marc N; Coker, Tumaini R; Mrug, Sylvie; Davies, Susan L; Schuster, Mark A

    2016-12-01

    The purpose of this study was to evaluate the relationship between the number of periods children were exposed to familial homelessness and childhood aggression and victimization. Survey data were obtained from 4,297 fifth-grade children and their caregivers in three U.S. cities. Children and primary caregivers were surveyed longitudinally in 7th and 10th grades. Family homelessness, measured at each wave as unstable housing, was self-reported by the caregiver. Children were categorized into four mutually exclusive groups: victim only, aggressor only, victim-aggressor, and neither victim nor aggressor at each time point using validated measures. Multinomial, multilevel mixed models were used to evaluate the relationship among periods of homelessness and longitudinal victimization, aggression, and victim aggression compared to children who were nonvictims and nonaggressors. Results suggest that children who experienced family homelessness were more likely than domiciled children to report aggression and victim aggression but not victimization only. Multivariate analyses suggested that even brief periods of homelessness were positively associated with aggression and victim aggression (relative to neither) compared to children who were never homeless. Furthermore, childhood victimization and victim aggression significantly decreased from 5th grade to 10th grade while aggression significantly increased in 10th grade. Children who experienced family homelessness for brief periods of time were significantly more likely to be a victim-aggressor or aggressor compared to those who were never homeless. Prevention efforts should target housing security and other important factors that may reduce children's likelihood of aggression and associated victimization. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  9. Victimization by Siblings in Children with Disability or Weight Problems.

    Science.gov (United States)

    Tucker, Corinna J; Finkelhor, David; Turner, Heather

    Children with a physical disability, psychological disorder, or of nonnormative weight are often targets of peer victimization. Sibling victimization, however, is more common than peer victimization, but rarely explored. We investigated linkages between sibling victimization and whether children had a physical disability, psychological disorder (i.e., internalizing disorder, attention deficit disorder/attention-deficit hyperactivity disorder), and were perceived by parents as being thinner than average or overweight. Also, we explored how the extent and kinds of sibling victimization experiences were related to these characteristics in childhood. A US probability sample of adult caregivers of a child aged 0 to 9 (N = 780; 50% women; mean age 4.58) in 2-child households who completed a telephone interview. Controlling for other forms of maltreatment and individual and family characteristics, children with a physical disability and parent-perceived children who are thinner than average and children who are overweight experienced more sibling victimization. Children with an internalizing disorder experienced less sibling victimization. Sibling victimization did not differ for children with and without ADHD. Children perceived to be overweight by parents and children with a physical disability were at increased risk of experiencing more types of sibling victimization. Children with a physical disability had greater odds of being victims of property victimization by a sibling. Children with a physical disability or perceived as different from average weight are at risk for sibling victimization. Using a nationally representative sample, this is the first study to highlight the importance of screening for sibling victimization in families of children with a disability and/or nonnormative weight status.

  10. Family as a factor of risk prevention and victim behaviour

    Directory of Open Access Journals (Sweden)

    Artur A. Rean

    2015-03-01

    Full Text Available The paper examines psychological factors victim behaviour. The definition of victim behaviour is given and it is emphasized that such conduct is not necessarily passivebehaviour of the victim. Victimization and behaviour can be active and aggressive. It is shown that antisocial, deviant behaviour of children and adolescents seriously increases the risk of victimization. Family as the most important institution of socialization is considered both as a preventing factor and risk factor of victim behaviour. The role of the family in shaping the victim behaviour is revealed in the following issues: aggressive, conflict behaviour is personal inclination or absence of the “proper” skills; interdependence of the severity of punishment and child aggression; punishment for child aggression (between siblings: what is the result?; ignoring aggression – is it the best solution?; victims of sexual violence and causes of victim behaviour; demonstrative accentuation as a risk factor in rape victim behaviour; happy family – can it be a risk factor for victim behaviour? For a long time, social deviant personality development has been believed to deal with structural deformation of the family, which is defined as a single-parent family, i.e. absence of one parent (usually the father. It is now proved that the major factor of family negative impact on personal development is not structural but psychosocial family deformation. A really happy family, psychologically happy family is the cornerstone of preventing victim behaviour. The victim behaviour being mainly determined by personal qualities does not negate this conclusion, but only strengthens it, as the qualities mentioned above are shaped in many respects within family socialization, are determined by family upbringing styles and features of interpersonal relationships inside the family.

  11. Impact of sexual harassment victimization by peers on subsequent adolescent victimization and adjustment: a longitudinal study.

    Science.gov (United States)

    Chiodo, Debbie; Wolfe, David A; Crooks, Claire; Hughes, Ray; Jaffe, Peter

    2009-09-01

    To examine gender differences in prevalence and types of sexual harassment victimization experienced in grade 9 and how it contributes to relationship victimization and psychological adjustment 2.5 years later. A total of 1734 students from 23 schools completed self-report surveys at entry to grade 9 and end of grade 11. Self-report data were collected on victimization experiences (sexual harassment, physical dating violence, peer violence, and relational victimization) and adjustment (emotional distress, problem substance use, self-harm, suicidal thoughts, maladaptive dieting, feeling unsafe at school, and perpetration of violent delinquency). Separate analyses by sex were prespecified. Sexual harassment victimization was common among boys (42.4%) and girls (44.1%) in grade 9, with girls reporting more sexual jokes, comments, and unwanted touch than among boys, and with boys reporting more homosexual slurs or receiving unwanted sexual content. For girls, sexual harassment victimization in grade 9 was associated with elevated risk of self-harm, suicidal thoughts, maladaptive dieting, early dating, substance use, and feeling unsafe at school. A similar pattern of risk was found for boys, with the exception of dieting and self-harm behaviors. Adjusted odds ratios (AOR) indicated these students were significantly more likely than nonharassed students to report victimization by peers and dating partners 2.5 years later (AOR for boys and girls, respectively; all p harassment (AOR: 2.45; 2.9), physical dating violence (AOR: 2.02; 3.73), and physical peer violence (AOR: 2.75; 2.79). Gr 9 sexual harassment also contributed significantly to emotional distress (AOR: 2.09; 2.24), problem substance use (AOR: 1.79; 2.04), and violent delinquency perpetration (AOR: 2.1; 3.34) 2.5 years later (boys and girls, respectively; all p harassment at the beginning of high school is a strong predictor of future victimization by peers and dating partners for both girls and boys, and

  12. Nuclear tests: the late indemnification of victims; Essais nucleaire: l'indemnisation tardive des victimes

    Energy Technology Data Exchange (ETDEWEB)

    Charbonneau, S. [Bordeaux-1 Univ., 33 (France)

    2010-04-15

    The author briefly recalls the historical context of the creation of the CEA and outlines the silence and denial about the radioactive contamination of military personnel during the nuclear tests performed in the Algerian Sahara and in Polynesia. He also outlines the continuous action of the association of veterans and victims of these nuclear tests which gathered proofs of health consequences. He comments the content and scope of application of laws which have been lately adopted (in 2010) to acknowledge these facts and indemnify the victims

  13. Bullying among schoolchildren: differences between victims and aggressors.

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; Espelt, Albert; Nebot Adell, Manel

    2013-01-01

    To identify the factors associated with bullying behaviors among adolescents by analyzing victims, aggressors and victims/aggressors separately. A cross-sectional study was performed in a representative sample of 3,089 secondary school students (13-18 years old) in Barcelona (Spain). To define bullying behaviors, we used three questions about different types of mistreatment (jeering, attacking, marginalizing). Compared with secondary school students not involved in bullying, victims, aggressors and victims/aggressors were more likely to be boys and to report negative mood states. Victims were younger, were more overweight or obese and were lighter cannabis users, while aggressors were also younger but reported more antisocial behaviors and more cannabis and alcohol use. Victims/aggressors reported more antisocial behaviors and were overweight. Being involved in bullying, independently of the role adopted, was associated with health-related problems, which can lead to psychological disorders in adulthood. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  14. The impact of criminal justice involvement on victims' mental health.

    Science.gov (United States)

    Parsons, Jim; Bergin, Tiffany

    2010-04-01

    The aftermath of violent crime can leave victims with persistent emotional and mental health problems. Although research has shown the potential benefits of prosecuting cases through the courts, there is also a substantial literature that suggests that common features of the criminal justice system can exacerbate the impact of the initial crime, leading to a secondary victimization. The authors present a review of the research on the positive and negative impact of criminal justice involvement, and common points of failure in the efforts of justice institutions to meet the needs of victims. They conclude with recommendations for future work, including the need for research on restorative justice, victim impact statements, court notification systems, victim services, and victim advocates.

  15. Identifying victims of violence using register-based data

    DEFF Research Database (Denmark)

    Kruse, Marie; Sørensen, Jan; Brønnum-Hansen, Henrik

    2010-01-01

    AIMS: The aim of this study was twofold. Firstly we identified victims of violence in national registers and discussed strengths and weaknesses of this approach. Secondly we assessed the magnitude of violence and the characteristics of the victims using register-based data. METHODS: We used three...... nationwide registers to identify victims of violence: The National Patient Register, the Victim Statistics, and the Causes of Death Register. We merged these data and assessed the degree of overlap between data sources. We identified a reference population by selecting all individuals in Denmark over 15....... RESULTS: In 2006, 22,000 individuals were registered as having been exposed to violence. About 70% of these victims were men. Most victims were identified from emergency room contacts and police records, and few from the Causes of Death Register. There was some overlap between the two large data sources...

  16. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    Directory of Open Access Journals (Sweden)

    Monika Mushevska

    2016-01-01

    Full Text Available The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of age, which are victims of different kinds of crime or witnesses of different kinds of crime, in spite of the role that they have in the crime act. In all proceedings that directly or indirectly child victims involved it is important to act in a way that is the best and most appropriate for the child.

  17. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  18. Domestic violence and the impact on its victims

    OpenAIRE

    Kirejevová, Iva

    2010-01-01

    Domestic violence is one of the essential problems of our society. Domestic violence is determined by high prevalence, enormous latency and great victimization impact. The aim of my thesis is to describe the psychological aspects of the victims of domestic violence. I presume that long-term psychological and physical violence has a crucial influence on the psycho-somatic health of the victim. I am aware of the fact that this problem does not concern only battered women. Nevertheless I want to...

  19. A Latent Class Analysis of Victimization among Middle and High School Students in California

    Science.gov (United States)

    Berkowitz, Ruth; De Pedro, Kris Tunac; Gilreath, Tamika D.

    2015-01-01

    School victimization is associated with negative social-emotional outcomes and risky behaviors. Most studies have provided definitions and measures of victimization, depicting a limited characterization of victimization in schools. More nuanced analyses of school victimization are needed to assess the heterogeneous pattern of victimization in…

  20. Victimisation and poverty: About victims and victimised in Serbia

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2014-01-01

    Full Text Available This paper is a theoretical analysis of the scientific and public discourse of victimization on the example of Serbia. The analysis has two objectives: to review the justification for the use of the concept of victim defined in the traditional way - within the legal framework; and in relation to this, to offer a different view on victimization. The process of becoming a victim is recognized as a social construct, created as a result of negotiations between the (non- formal social structure: institutions, the media, and the audience - those who stand aside, criminals and victims. In the process, some of the victims are assigned a status of justified, while others are sacrificed. There are rearely true parallels between them. Thus, unlike justified, whose suffering is perceived by public and political structures as a cause for the introduction of penal populism, the sacrificed rarely encounter any empathy. Even when they are victimized by conventional crime, the victims do not have the power to mobilize the public in a loud protest and call for change in legal practice. In the final score, it seems that the role victims are assigned largely depend of their social scale position.