WorldWideScience

Sample records for victims fund preservation

  1. Compensation for the victims of violence from the public funds

    Directory of Open Access Journals (Sweden)

    Mrvić-Petrović Nataša

    2013-01-01

    Full Text Available In the Republic of Serbia there is still neither a public fund for the compensation of the victims of the violent crime, nor do the until now undertaken reform of the penal law respect in the necessary measure the interests of the victims. The documents of the UN, the European Council and the EU contain guidelines for the foundation of funds for the public compensation of the victims of violence, and the comparative European experiences indicate by their action the existing system of social protection is completed. The authors analyses the reasons for the introduction of these funds and they plead for the compensation of the victims from public funds to be enabled for the reason of justice and humanity, according to the idea of prosperity within a state of prosperity. That reason should have priority in relation to other, pragmatic, criminal-political reasons and the obligation of the domestic legislation to (formally adjust itself to the European standards.

  2. Administrator of 9/11 victim compensation fund to administer Hokie Spirit Memorial Fund distributions

    OpenAIRE

    Hincker, Lawrence

    2007-01-01

    Virginia Tech President Charles Steger has asked Kenneth R. Feinberg, who served as "Special Master of the federal September 11th Victim Compensation Fund of 2001," to administer distributions of the university Hokie Spirit Memorial Fund (HSMF).

  3. FINANCIAL AUDIT: Capitol Preservation Fund's Fiscal Years 2001 and 2000 Financial Statements

    National Research Council Canada - National Science Library

    Franzel, Jeanette

    2002-01-01

    The statements of the financial position of the Capitol Preservation Fund (the Fund) as of September 30, 2001, and 2000 were audited, and the related statements of activities and statements of cash flows for the fiscal years then ended...

  4. 78 FR 33800 - Notice of Funding Availability: Section 515 Multi-Family Housing Preservation Revolving Loan Fund...

    Science.gov (United States)

    2013-06-05

    ... Housing Tax Credits (LIHTC) assistance, when a tenant receives such housing benefits. Additional tenant... matching funds from third parties, including housing tax credits for rural housing assistance and to... unqualified audited opinion signed by an independent Certified Public Accountant (CPA) acceptable to the...

  5. 31 CFR 256.32 - What documentation must be submitted to the Judgment Fund Branch to preserve the right to seek...

    Science.gov (United States)

    2010-07-01

    ... to the Judgment Fund Branch to preserve the right to seek interest under 31 U.S.C. 1304(b) in a case... Costs § 256.32 What documentation must be submitted to the Judgment Fund Branch to preserve the right to... preserve interest rights under 31 U.S.C. 1304. A copy of the judgment and cover letter must be sent to the...

  6. 37 CFR 10.112 - Preserving identity of funds and property of client.

    Science.gov (United States)

    2010-07-01

    ... and property of client. 10.112 Section 10.112 Patents, Trademarks, and Copyrights UNITED STATES PATENT... funds and property of client. (a) All funds of clients paid to a practitioner or a practitioner's firm... therein. (2) Funds belonging in part to a client and in part presently or potentially to the practitioner...

  7. 77 FR 5065 - Preservation Trust Advisors, LLC and Northern Lights Fund Trust; Notice of Application

    Science.gov (United States)

    2012-02-01

    ... Board minutes, that such change is in the best interests of the Fund and its shareholders, and does not... that would permit them to enter into and materially amend subadvisory agreements without shareholder... application will be issued unless the Commission orders a hearing. Interested persons may request a hearing by...

  8. Preservation of Community College Logic: Organizational Responses to State Policies and Funding Practices in Three States

    Science.gov (United States)

    Levin, John S.; Martin, Marie C.; López Damián, Ariadna Isabel; Hoggatt, Michael J.

    2018-01-01

    Objective: With both policy pressures from state governments, including states' funding behaviors, and the logic of the institution deeply ingrained over decades, community colleges face considerable challenge in reconciling conflicting values and requirements. Yet, as organizations they adapt to survive, and outcomes of adaptation may lead to an…

  9. The use of public funds for environmental preservation and environmental education activities in the light of the Polish Supreme Audit Office reports

    Directory of Open Access Journals (Sweden)

    Maciej Serowaniec

    2018-03-01

    Full Text Available This article aims to present the assessment of the implementation of public funds provided under grant agreements for environmental preservation and environmental education activities in the light of the reports submitted by the Polish Supreme Audit Office (NIK. The areas covered by the audit were: the completeness and timeliness of the tasks defined in the agreements, the economy and legality of the use of the financial resources, the correctness of keeping financial and accounting records, and the preparation of reports and the settlement of funds.

  10. Woman-to-woman rape and sexual assault, and its impact upon the occupation of work: Victim/survivors' life roles of worker or student as disruptive and preservative.

    Science.gov (United States)

    Twinley, Rebecca

    2017-01-01

    Woman-to-woman rape and sexual assault globally remains largely unknown and unaddressed. Expectedly, victim/survivors often cope alone, or with limited support, in the traumatic aftermath of their sexual victimisation. Work is one occupation that is impacted upon at this time. The study explored the perceived impacts of woman-to-woman rape and sexual assault, the subsequent experience of disclosure, reaction, and support, and the consequences for victim/survivors' subjective experience of occupation. The study combined a sociological auto/biographical approach with an occupational science perspective. A web-based survey generated initial data, and was also used as a sampling tool; subsequently, 10 respondents were interviewed face-to-face, in various UK locations. An eleventh respondent shared her story through correspondence. Four key themes emerged: 1) Identity; 2) Emotion; 3) Survival; and 4) Occupation. The latter, occupation, incorporated study and work. For these victim/survivors, work or education can be experienced as either: disrupted (triggering) or as preservative (maintenance). Their life roles as worker or student were impacted by feelings that they could have performed better and achieved more. Occupational therapists and other relevant service providers could work with sexually victimised people in order to participate more satisfactorily and healthily in the occupation of work.

  11. 78 FR 36510 - Notice of Funds Availability for the Section 533 Housing Preservation Grants for Fiscal Year 2013

    Science.gov (United States)

    2013-06-18

    ... Preservation's (Council) advice as to how the disagreement might be resolved, and a copy of any advice provided...) prohibits discrimination against its customers, employees, and applicants for employment on the bases of...

  12. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  13. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  14. 78 FR 52877 - VOCA Victim Assistance Program

    Science.gov (United States)

    2013-08-27

    ... these requirements has merely been re-worked for clarity. Under the proposed rule SAAs must identify... victim populations will allow OVC and SAAs to better tailor their training and technical assistance and... SAAs may use for these purposes. Funding victim service programs located in adjacent States. Program...

  15. The New York State Program for the Conservation and Preservation of Library Research Materials. Selected Press Clippings about Projects Funded by the Discretionary Grant Program, 1988/89 and 1989/90.

    Science.gov (United States)

    New York State Library, Albany. Div. of Library Development.

    This document is composed of clippings from news publications and press releases about projects funded by the New York State Discretionary Grant Program for Conservation and Preservation of Library Research Materials, which annually awards $500,000 to libraries, archives, historical societies, and similar agencies in New York State through…

  16. Cyberstalking victimization

    Directory of Open Access Journals (Sweden)

    Vilić Vida

    2013-01-01

    Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

  17. VT Historic Preservation Grant

    Data.gov (United States)

    Vermont Center for Geographic Information — The State-funded Historic Preservation Grant Program helps municipalities and non-profit organizations rehabilitate the historic buildings that are a vital part of...

  18. Society of Behavioral Medicine (SBM) position statement: SBM urges Congress to preserve and increase the financing of federally funded nutrition assistance programs and services.

    Science.gov (United States)

    Behrman, Pamela; Demirci, Jill; Yanez, Betina; Beharie, Nisha; Laroche, Helena

    2018-05-03

    Deep cuts have been proposed to federally funded nutrition assistance programs, including the Supplemental Nutrition Assistance Program (SNAP); the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC); and federally subsidized school breakfast and lunch programs. Yet, these programs help parents afford healthy meals for their families, pregnant and postpartum mothers access supplemental foods and health services for themselves and their infants and young children, and children obtain the nutrition necessary for optimal school performance. Participation in these programs is linked with reductions in perinatal morbidity and mortality, improved childhood growth trajectories, enhanced school performance, and reductions in food insecurity and poverty. Given these compelling health and economic benefits, the Society of Behavioral Medicine urges Congress to protect and increase funding for federally funded nutrition assistance programs, specifically SNAP, WIC, and school breakfast and lunch programs. Per the recent (2017) recommendations of the School Nutrition Association, Congress should also resist any attempts to "block-grant" subsidized school breakfast and lunch programs, which could reduce access to these programs. It is further recommended that Congress improve the scope of implementation- and outcomes-based assessments of these programs. Finally, we recommend efforts to increase awareness of and participation in SNAP, WIC, and federally funded school meal programs for eligible individuals, children, and families.

  19. Employment Status and Posttraumatic Stress Disorder following Compensation Seeking in Victims of Violence

    Science.gov (United States)

    Kunst, Maarten J. J.

    2011-01-01

    The current study was developed to explore the associations between posttraumatic stress disorder (PTSD), level of compensation for pain and suffering, and employment status in a sample of victims of violence (n = 226) who had held a full-time job at time of victimization and had filed a claim with the Dutch Victim Compensation Fund (DVCF)…

  20. Secondary victims of rape

    DEFF Research Database (Denmark)

    Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask

    2012-01-01

    secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...

  1. Perception of library staff on the preservation and conservation of ...

    African Journals Online (AJOL)

    Perception of library staff on the preservation and conservation of library resources in the Federal ... Journal Home > Vol 48, No 1-2 (2015) > ... of preservation policy as well as lack of funding to purchase preservation equipment in the library.

  2. Victimization of Obese Adolescents

    Science.gov (United States)

    Robinson, Sabrina

    2006-01-01

    Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…

  3. Sudden death victims

    NARCIS (Netherlands)

    Ceelen, Manon; van der Werf, Christian; Hendrix, Anneke; Naujocks, Tatjana; Woonink, Frits; de Vries, Philip; van der Wal, Allard; Das, Kees

    2015-01-01

    The goal of this study was to ascertain accordance between cause of death established by the forensic physician and autopsy results in young sudden death victims in the Netherlands. Sudden death victims aged 1-45 years examined by forensic physicians operating in the participating regions which also

  4. Sexual Victimization of Youth

    Science.gov (United States)

    Small, Kevonne; Zweig, Janine M.

    2007-01-01

    An estimated 7.0% to 8.1% of American youth report being sexually victimized at some point in their life time. This article presents a background to youth sexual victimization, focusing on prevalence data, challenging issues when studying this problem, risk factors, and common characteristics of perpetrators. Additionally, a type of sexual…

  5. Wood preservation

    Science.gov (United States)

    Kevin Archer; Stan Lebow

    2006-01-01

    Wood preservation can be interpreted to mean protection from fire, chemical degradation, mechanical wear, weathering, as well as biological attack. In this chapter, the term preservation is applied more restrictively to protection from biological hazards.

  6. Aid for the victims of the forest fires in Greece

    CERN Multimedia

    2007-01-01

    To support the victims of the fires which devastated the Peloponnese at the end of August, the Permanent Mission of Greece in Geneva has informed us that the Greek government has opened an account into which donations may be paid. The funds collected will be used to assist the many victims of these fires. Bank of Greece Account name: Logariasmos Arogis Pyropathon (Hellenic Republic) (account reserved for aid for the victims of the forest fires) SWIFT : BNGRGRAA IBAN : GR 98 0100 0230 0000 0234 1103 053

  7. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  8. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  9. Effects of poly-victimization on self-esteem and post-traumatic stress symptoms in Spanish adolescents.

    Science.gov (United States)

    Soler, Laia; Paretilla, Clàudia; Kirchner, Teresa; Forns, Maria

    2012-11-01

    This study aims to provide evidence concerning the effects of experiencing multiple forms of victimization (poly-victimization) on self-esteem and post-traumatic stress symptoms in Spanish adolescents. A total of 722 adolescents were recruited from seven secondary schools in Catalonia, Spain. The Rosenberg Self-Esteem Scale, the Youth Self Report and the Juvenile Victimization Questionnaire were employed to assess self-esteem, post-traumatic stress symptoms and victimization, respectively. Participants were divided into three groups (non-victim, victim and poly-victim groups) according to the total number of different kinds of victimization experienced. Results showed that 88.4 % of adolescents had been exposed to at least one kind of victimization. Poly-victimization was associated with a higher number of post-traumatic stress symptoms in both boys and girls. Also, self-liking was significantly lower in the poly-victim group, whereas self-competence was equivalent across the three victimization groups. Girls were approximately twice as likely to report child maltreatment (OR = 1.92) and sexual victimization (OR = 2.41) as boys. In conclusion, the present study adds evidence on the importance of taking account of the full burden of victimizations suffered when studying victimization correlates. Also, it highlights the importance of prevention policies to focus particularly on preserving adolescents' sense of social worth.

  10. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  11. Adolescent sexual victimization

    DEFF Research Database (Denmark)

    Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P

    2012-01-01

    at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early......The present study set out to investigate predictors of first time adolescent peer-on-peer sexual victimization (APSV) among 238 female Grade 9 students from 30 schools in Denmark. A prospective research design was utilized to examine the relationship among five potential predictors as measured...... sexual onset and failing to signal sexual boundaries did not. The present study identifies specific risk factors for first time sexual victimization that are potentially changeable. Thus, the results may inform prevention initiatives targeting initial experiences of APSV....

  12. Victimization and pain

    Directory of Open Access Journals (Sweden)

    Małgorzata K. Szerla

    2013-12-01

    Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.

  13. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  14. Between "Victims" and "Criminals"

    DEFF Research Database (Denmark)

    Plambech, Sine

    2014-01-01

    This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...... trafficking”; others were categorized as undocumented migrants—“criminals” guilty of violating immigration laws. Despite the growing political attention devoted to protecting victims of trafficking, I argue that in areas of Nigeria prone to economic insecurity and gender-based violence, the categories...

  15. Perpetrator or victim?

    DEFF Research Database (Denmark)

    Hansen, Helle Rabøl

    Paper 3: HAN091384 Victim, Perpetrator and Pupil - Teacher Perspectives on Peer Bullying Helle Rabøl Hansen, University of Aarhus This paper investigates the approaches and strategies taken up by two crucial actors in relation to bullying in schools: 1. documents indicating school policies...... and identifies a legally informed matrix, which points out unequivocal positions of perpetrators and victims. The policy document mixes the definition practices, which derive from the Olweus tradition on bullying research, into a law informed kind of discourse. Subsequently the policy document iterates...

  16. Attracting Assault: Victims' Nonverbal Cues.

    Science.gov (United States)

    Grayson, Betty; Stein, Morris I.

    1981-01-01

    Describes a study in which prison inmates convicted of assault identified potential victims from videotapes. A lab analysis code was used to determine which nonverbal body movement categories differentiated victims and nonvictims. (JMF)

  17. Urine Preservative

    Science.gov (United States)

    Smith, Scott M. (Inventor); Nillen, Jeannie (Inventor)

    2001-01-01

    Disclosed is CPG, a combination of a chlorhexidine salt (such as chlorhexidine digluconate, chlorhexidine diacetate, or chlorhexidine dichloride) and n-propyl gallate that can be used at ambient temperatures as a urine preservative.

  18. Victims and Heroes

    DEFF Research Database (Denmark)

    Højbjerg, Christian K.

    2010-01-01

    Victimization, autochthony and citizenship, power and nation-building constitute recurrent, interrelated themes in post-war Manding historical memory in the border area between Liberia and Guinea. While the perceived history of the Manding diverges from academic, historical knowledge as well...

  19. Prevalence and predictors of posttraumatic stress disorder among victims of violence applying for state compensation.

    Science.gov (United States)

    Kunst, Maarten; Winkel, Frans Willem; Bogaerts, Stefan

    2010-09-01

    Many studies have focused on the predictive value of victims' emotions experienced shortly after violence exposure to identify those vulnerable for development of posttraumatic stress disorder (PTSD). However, many victims remain unidentified during the initial recovery phase, yet may still be highly in need of psychological help after substantial time since victimization has passed. Professionals involved in the settlement of civil damage claims filed by victims of violence may play an important role in referring victims with current psychological problems to appropriate treatment services, as they are likely to maintain relations with victims until all compensation possibilities have been exhausted. As an exploratory examination of this topic, the current study investigates the potential utility of file characteristics as predictors of chronic PTSD among 686 victims of violence who had applied for state compensation with the Dutch Victim Compensation Fund (DVCF) in 2006. Identification of significant predictors is preceded by estimating prevalence rates of PTSD. Results indicate that approximately 1 of 2 victims applying for state compensation in the Netherlands still have PTSD many years after victimization and claim settlement. Age, female sex, time since victimization, acquaintance with the perpetrator, violence-related hospitalization, and compensation for immaterial damage prove to be predictive of PTSD, although female sex and immaterial damage compensation fail to reach significance after adjusting for recalled peritraumatic distress severity. Implications for policy practice as well as strengths and limitations of the study are discussed.

  20. Victim Simulator for Victim Detection Radar

    Science.gov (United States)

    Lux, James P.; Haque, Salman

    2013-01-01

    Testing of victim detection radars has traditionally used human subjects who volunteer to be buried in, or climb into a space within, a rubble pile. This is not only uncomfortable, but can be hazardous or impractical when typical disaster scenarios are considered, including fire, mud, or liquid waste. Human subjects are also inconsistent from day to day (i.e., they do not have the same radar properties), so quantitative performance testing is difficult. Finally, testing a multiple-victim scenario is difficult and expensive because of the need for multiple human subjects who must all be coordinated. The solution is an anthropomorphic dummy with dielectric properties that replicate those of a human, and that has motions comparable to human motions for breathing and heartbeat. Two airfilled bladders filled and drained by solenoid valves provide the underlying motion for vinyl bags filled with a dielectric gel with realistic properties. The entire assembly is contained within a neoprene wetsuit serving as a "skin." The solenoids are controlled by a microcontroller, which can generate a variety of heart and breathing patterns, as well as being reprogrammable for more complex activities. Previous electromagnetic simulators or RF phantoms have been oriented towards assessing RF safety, e.g., the measurement of specific absorption rate (SAR) from a cell phone signal, or to provide a calibration target for diagnostic techniques (e.g., MRI). They are optimized for precise dielectric performance, and are typically rigid and immovable. This device is movable and "positionable," and has motion that replicates the small-scale motion of humans. It is soft (much as human tissue is) and has programmable motions.

  1. Do Local Elites Capture Natural Disaster Reconstruction Funds?

    OpenAIRE

    Yoshito Takasaki

    2009-01-01

    This paper examines the allocation of natural disaster reconstruction funds among cyclone victims in rural Fiji. During post-emergency periods, when good information about cyclone damage is available, do local elites, a powerful minority, capture housing construction materials? With effective targeting in both receipt and the amount received, local elites do not capture larger benefits. More severely affected victims are not early recipients, though, because the supply of reconstruction funds...

  2. Emittance preservation

    Energy Technology Data Exchange (ETDEWEB)

    Kain, V; Arduini, G; Goddard, B; Holzer, B J; Jowett, J M; Meddahi, M; Mertens, T; Roncarolo, F; Schaumann, M; Versteegen, R; Wenninger, J [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    Emittance measurements during the LHC proton run 2011 indicated a blow-up of 20 % to 30 % from LHC injection to collisions. This presentation will show the emittance preservation throughout the different parts of the LHC cycle and discuss the current limitations on emittance determination. An overview of emittance preservation through the injector complex as function of bunch intensity will also be given. Possible sources for the observed blow-up and required tests in 2012 will be presented. Possible improvements of emittance diagnostics and analysis tools for 2012 will be shown.

  3. Immigrants as crime victims: Experiences of personal nonfatal victimization.

    Science.gov (United States)

    Wheeler, Krista; Zhao, Weiyan; Kelleher, Kelly; Stallones, Lorann; Xiang, Huiyun

    2010-04-01

    Immigrants to the United States are disproportionately victims of homicide mortality in and outside the workplace. Examining their experiences with nonfatal victimization may be helpful in understanding immigrant vulnerability to violence. We compared the annual prevalence of nonfatal personal victimization experienced by immigrant and US-born adults by sociodemographics, employment, occupation, industry, smoking, alcohol and drug use using data from Wave 1 National Epidemiologic Survey on Alcohol and Related Conditions. The prevalence of victimization among immigrants was comparable to that among US-born adults [3.84% (95% CI: 3.18-4.63) vs. 4.10% (95% CI: 3.77-4.44)]. Lower percentages of victimization experienced by immigrants were seen among the unmarried, those age 30-44 years, and among residents of central city areas as compared to those groups among the US-born. For immigrants entering the US as youth, the victimization prevalence declines with greater years of residency in US. Multivariate logistic regression models suggest that, the odds of victimization was significantly associated with age, family income, marital status, central city residency, smoking, and drug use while employment status was not a significant factor. Immigrant workers with farming/forestry occupations might face a higher risk of being victims of violence than their US-born counterparts. The prevalence of victimization among immigrants was comparable to that among US-born adults. Employment status and industry/occupation overall were not significant risk factors for becoming victims of violence. (c) 2010 Wiley-Liss, Inc.

  4. Preserving Transactional Data

    OpenAIRE

    Sara Day Thomson

    2017-01-01

    This paper is an adaptation of a longer report commissioned by the UK Data Service. The longer report contributes to on-going support for the Big Data Network – a programme funded by the Economic and Social Research Council (ESRC). The longer report can be found at doi:10.7207/twr16-02. This paper discusses requirements for preserving transactional data and the accompanying challenges facing the companies and institutions who aim to re-use these data for analysis or research. It present...

  5. Modelling the Costs of Preserving Digital Assets

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2012-01-01

    Information is increasingly being produced in digital form, and some of it must be preserved for the longterm. Digital preservation includes a series of actively managed activities that require on-going funding. To obtain sufficient resources, there is a need for assessing the costs...... and the benefits accrued by preserving the assets. Cost data is also needed for optimizing activities and comparing the costs of different preservation alternatives. The purpose of this study is to analyse generic requirements for modelling the cost of preserving digital assets. The analysis was based...

  6. Is sexual victimization gender specific?

    DEFF Research Database (Denmark)

    Sundaram, Vanita; Laursen, Bjarne; Helweg-Larsen, Karin

    2008-01-01

    The present study investigates the prevalence of sexual victimization and correlations between sexual victimization and indicators of poor health in two representative samples of men and women in Denmark. Specifically, the authors explore the prevalence of self-reported victimization among...... adolescents (N = 5,829) and adults (N = 3,932) and analyze differences in self-reported health outcomes between male and female victims and corresponding controls. Gender differences are found in the reported prevalence of sexual victimization. Significantly more females than males reported forced sexual...... experiences in both samples. Associations between sexual victimization and poor health outcomes are found for both genders. Comparable patterns of association for men and women are found on a number of variables, particularly those pertaining to risk behavior....

  7. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  8. Fund Raising for Haiti

    CERN Multimedia

    Association du personnel

    2010-01-01

    Dear Colleagues, Following the devastating earthquake that hit Haiti on 12 January 2010, the CERN Management and the Staff Association are organizing a collection to help the victims. The money collected will be transferred to associations or bodies guaranteeing proper use of the funds, such as the Association Haïti Ecoles based in Cessy, which our Long Term Collections supported for several years. From today you can pay your donations into a special UBS account, indicating “Séisme Haïti” as the reason for payment . SWIFT : UBSWCHZH12B IBAN : CH85 0027 9279 HU10 6832 1 Account Holder : Association du personnel du CERN We are counting on the generosity of the CERN community to support the Haitian people at this very difficult time. Thank you on their behalf. Rolf Heuer Director-General Gianni Deroma President of the Staff Association

  9. Pension Fund

    CERN Multimedia

    HR Department

    2009-01-01

    In line with the decisions concerning the new governance of the Pension Fund taken by the Council in June and September 2007, amendments to Section 2 "Structure and Functions" of the Rules of the Fund (Article I 2.08 – Composition of the Investment Committee and Article I 2.08b – Chairman of the Investment Committee) entered into force on 1st January 2009. These articles replace the provisions of the existing Regulations of the Investment Committee of the Pension Fund relating to the composition and chairman of the Investment Committee. Amendment No. 27 (PDF document) may be downloaded directly from the Pension Fund website: http://pensions.web.cern.ch/Pensions/statuts___rules.htm or obtained from the Administration of the Fund (Tel. 022 7672742, mailto:Barbara.Bordjah@cern.ch).

  10. ARGICULTURAL LAND PROTECTION FUND AND FOREST FUND AS ECOLOGICAL FUNDS

    OpenAIRE

    Bartosz Bartniczak

    2009-01-01

    Funds for environmental protection and water management, Agricultural Land Protection Fund and Forest Fund make up the Polish system of special fund in environment protection. The main aim of this article is to analyze the activity of two latest funds. The article tries to answer the question whether that funds could be considered as ecological funds. The author described incomes and outlays of that funds and showed which reform should be done in Polish special funds system.

  11. The dilemmas of victim positioning

    Directory of Open Access Journals (Sweden)

    Dorte Marie Søndergaard

    2015-08-01

    Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.

  12. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  13. Cyberbullying victimization in adolescents’ population

    Directory of Open Access Journals (Sweden)

    Nešić Marija

    2016-01-01

    Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.

  14. Pension Fund

    CERN Multimedia

    2005-01-01

    Amendment No 21 to the Rules and Regulations of the Pension Fund has just been published and can be obtained from Department/Unit secretariats or, in the case of pensioners, directly from the Administration of the Fund (tel. 767-91 94/27 38), bldg 5, 1-030. This Amendment, which entered into force on 17.03.2005, concerns Article I 2.05 (Composition of the Governing Board) and Article I 2.06 (Chairman and Vice-Chairmen of the Governing Board) of the Rules of the Pension Fund.

  15. Pension Fund

    CERN Multimedia

    HR Department

    2007-01-01

    The Rules and Regulations of the Pension Fund have been updated, following Council's decision of December 2006 concerning the adjustment of pensions, fixed amounts and allowances by 1.16% with effect from 1.1.2007 (Annex B, page 31). The updated version can be downloaded directly from the Pension Fund's website (http://pensions.web.cern.ch/Pensions/statuts___rules.htm or obtained from the Fund Administration (Tel. 022 767 27 42, Building 5, 1-030, or by e-mail Sophia.Revol@cern.ch).

  16. Pension Fund

    CERN Multimedia

    HR Department

    2007-01-01

    The Rules and Regulations of the Pension Fund have been updated, following Council's decision of December 2006 concerning the adjustment of pensions, fixed amounts and allowances by 1.16% with effect from 1.1.2007 (Annex B, page 31). The updated version can be downloaded directly from the Pension Fund's website (http://pensions.web.cern.ch/Pensions/statuts___rules.htm) or obtained from the Fund Administration (Tel. 022 767 27 42, Building 5, 1-030), or by e-mail (Sophia.Revol@cern.ch).

  17. Pension Fund

    CERN Multimedia

    2006-01-01

    As announced in the Bulletin during the summer, the Pension Fund has published a complete new version of the Fund's Rules and Regulations incorporating all amendments up to 1 November 2006, following the decisions of the CERN Council. This new version of the Rules and Regulations can be downloaded in A4 format (pdf document) directly from the Pension Fund's website (http://pensions.web.cern.ch/Pensions/statuts___rules.htm for the Rules and http://pensions.web.cern.ch/Pensions/règlements___regulations.htm for the Regulations) or obtained from the Fund Administration (Tel. 022 767 27 42, Building 5, 1-030, or by e-mail Sophia.Revol@cern.ch).

  18. Pension Fund

    CERN Multimedia

    HR Department

    2009-01-01

    In line with the decisions taken by the Council in June and September 2007 concerning the new governance of the Pension Fund, amendments to Section 2 «Structure and Functions» of the Rules of the Fund entered into force on 1st January 2009 (Article I 2.08 – Composition of the Investment Committee and Article I 2.08bis – Chairman of the Investment Committee). Amendment n°27 may be downloaded (PDF document) directly from the Pension Fund website: http://pensions.web.cern.ch/Pensions/statuts___rules.htm or obtained from the Administration of the Fund (Tel. 022 767 2742, mailto:Barbara.Bordjah@cern.ch).

  19. Funding innovation

    CERN Multimedia

    Marina Giampietro

    2012-01-01

    For the first time, six knowledge and technology transfer activities are set to benefit from a dedicated fund made available by the Knowledge Transfer group. This initiative cements CERN’s commitment to sharing its technological knowledge and expertise with society.   GEM detectors for flame detection and early earthquake prediction, radio-frequency absorbers for energy recovery, and exotic radioisotopes for medical applications are among the projects funded by the recently introduced KT Fund. “CERN’s scientific programme generates a considerable amount of intellectual property, a natural driver for innovation,” explains Giovanni Anelli, Head of the Knowledge Transfer Group. “Very often, though, financial support is needed to bring the newly-born technologies a step further and make them ready for transfer to other research institutes or to companies.” This is where the KT fund comes into play. It provides vital support in the early sta...

  20. Pension Fund

    CERN Multimedia

    2004-01-01

    Amendment No 20 to the Rules and Regulations of the Pension Fund has just been published and can be obtained from Department/Unit secretariats or, in the case of pensioners, directly from the Administration of the Fund (tel. 767-91 94/27 38), bldg 5, 1-030. This Amendment, which entered into force on 1.1.2004, concerns the fixed sums and allowances adjusted at same date (Annex B).

  1. Pension Fund

    CERN Multimedia

    HR Department

    2008-01-01

    The 2007 Annual Report and Accounts of the Pension Fund which was approved by Council at its session of 20 June 2008, is now available from the Departmental secretariats. Pension beneficiaries who wish to obtain this document should contact Emilie Clerc (Tel. + 41 22 767 87 98), building 5-5/017. It is also available on the Pension fund site: http://pensions.web.cern.ch/Pensions/

  2. Pension Fund

    CERN Multimedia

    HR Department

    2008-01-01

    The Pension Fund Governing Board (PFGB) held two meetings over the summer, the first on 9 June and the second on 1st September. The agendas of the two meetings had several items in common, including progress reports on the work of the four working groups. Group 1, which is responsible for the revision of Chapter I, Section 2 of the Rules of the Fund, has made good progress but will need more time to complete its terms of reference in view of the number and complexity of the articles to be amended. In parallel, the Group has approved a code of conduct for the Pension Fund, which is based, in particular, on the new charter introduced for Swiss pension funds by the Swiss Association of Provident Institutions (ASIP) and the CFA (Chartered Financial Analyst) code of ethics applicable to members of pension fund bodies. The PFGB took note that the Group had also been working on the rules relating to the status of the personnel of the Fund and the composition of the Investment Committee. The work of Group 2, responsi...

  3. Pension fund

    CERN Multimedia

    2006-01-01

    At its June 2006 meeting, the Finance Committee approved the following amendment to Article 6a of the Regulations for elections to the Governing Board of the Pension Fund, which will enter into force on 1.7.2006: Current text New text ... 6a. The Administrator of the Fund shall be responsible for holding the elections and for issuing all relevant information. ... ... 6a. The Administrator of the Fund shall be responsible for holding the elections by electronic voting or, if this method cannot be used, following the procedure outlined in Articles 6i., 6j. and 6k. below. He shall issue to the members of the Pension Fund all relevant information concerning the elections. The deadlines mentioned in paragraphs 6i. and 6j. below shall apply mutatis mutandis to electronic voting. ... The amendment will allow the Pension Fund to use an electronic voting procedure for the election of elected members to the Governing Board of the Fund. It will be included in a complete new edition of the Rules and Regulatio...

  4. Victims of cyberstalking in Serbia

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina

    2009-01-01

    Full Text Available The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.

  5. PENSION FUND

    CERN Multimedia

    1999-01-01

    The Governing Board of the Pension Fund held its first three meetings of the year on 2 February, 2 March and 13 April.At the first of these meetings the Board first heard a presentation by Mrs H. Richmond of JP Morgan on the results of the currency overlay programme applied to the Fund's assets. Thanks to the policy pursued by this company, volatility, i.e. portfolio risk for assets denominated in currencies other than the Swiss franc, has been reduced. However, despite the fact that JP Morgan has considerable expertise in this field, no gain has been achieved over the past year. The Governing Board heard a report by the Investment Committee Chairman G. Maurin on the meetings of 21-22 and 28 January at which the Pension Fund's various fund managers had been interviewed on their results. Decisions were taken on benchmarks aimed at optimising management and on the terms of reference of the Internal Management Unit. It was also decided to place two fund managers on a watching list and to request them to make eve...

  6. Pension Fund

    CERN Multimedia

    HR Department

    2008-01-01

    The PFGB held two meetings over the summer, the first on 9 June and the second on 1st September. The agendas of the two meetings had several items in common, including progress reports on the work of the four working groups. Group 1, which is responsible for the revision of Chapter I, Section 2 of the Rules of the Fund, has made good progress but will need more time to complete its terms of reference in view of the number and complexity of the articles to be amended. In parallel, the Group has approved a code of conduct for the Pension Fund, which is based, in particular, on the new charter introduced for Swiss pension funds by the Swiss Association of Provident Institutions (ASIP) and the CFA (Chartered Financial Analyst) code of ethics applicable to members of pension fund bodies. The PFGB took note that the Group had also been working on the rules relating to the status of the personnel of the Fund and the composition of the Investment Committee. The work of Group 2, resp...

  7. Pension Fund

    CERN Multimedia

    2003-01-01

    All members and beneficiaries of the Pension Fund are invited to attend the Annual General Asssembly to be held in the CERN Auditorium on Wednesday 8 October 2003 at 14.30 hrs The Agenda comprises: 1. Opening RemarksJ. Bezemer 2. Annual Report 2002: Presentation and results Copies of the Report are available from divisional secretariats. C. Cuénoud 3. Overview of the present situation with regard to pension funds C. Cuénoud 4. Performance of the Fund since the year 2000 and aspects of the ongoing asset/liability modelling exercise G. Maurin 5. Questions from members and beneficiariesPersons wishing to ask questions are encouraged to submit them, where possible, in writing in advance, addressed to Mr C. Cuénoud, Administrator of the Fund. 6. Conclusions J. Bezemer As usual, participants are invited to drinks after the assembly. NB The minutes of the 2002 General Assembly are available from the Administration of the Fund tel.(+4122)767 27 42; e-mail Sophia.Revol@cern.ch)

  8. Predicting Rape Victim Empathy Based on Rape Victimization and Acknowledgment Labeling.

    Science.gov (United States)

    Osman, Suzanne L

    2016-06-01

    Two studies examined rape victim empathy based on personal rape victimization and acknowledgment labeling. Female undergraduates (Study 1, n = 267; Study 2, n = 381) from a Northeast U.S. midsize public university completed the Rape-Victim Empathy Scale and Sexual Experiences Survey. As predicted, both studies found that acknowledged "rape" victims reported greater empathy than unacknowledged victims and nonvictims. Unexpectedly, these latter two groups did not differ. Study 1 also found that acknowledged "rape" victims reported greater empathy than victims who acknowledged being "sexually victimized." Findings suggest that being raped and acknowledging "rape" together may facilitate rape victim empathy. © The Author(s) 2015.

  9. Opportunities to preserve forensic evidence in emergency departments.

    Science.gov (United States)

    Peel, Matthew

    2016-11-10

    Victims of violence often seek assistance from emergency departments, so emergency nurses are ideally placed to identify them, and other 'forensic' patients, and protect the evidence that could support any ensuing legal process. Emergency nurses who are trained to identify, collect and preserve forensic evidence can support the identification, elimination and prosecution of suspects. This article gives an overview of forensic evidence, and explains how emergency nurses can preserve and collect samples effectively.

  10. Punishment goals of crime victims.

    Science.gov (United States)

    Orth, Uli

    2003-04-01

    Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.

  11. Preserving the Manhattan Project

    Science.gov (United States)

    Kelly, Cynthia

    2014-03-01

    When future generations look back on the 20th century, few events will rival the harnessing of nuclear energy as a turning point in world history, science and society. Yet, the Department of Energy has not always embraced its Manhattan Project origins. The presentation will focus on the progress made over the last 20 years to preserve the properties and first-hand accounts that for decades have been threatened with demolition and indifference. Since the mid-1950s, most remaining Manhattan Project properties at the Los Alamos National Laboratory had been abandoned. Among them was a cluster of wooden buildings called the ``V Site.'' This is where scientists assembled the ``Gadget,'' the world's first atomic device tested on July 16, 1945. Regardless of its significance, the ``V Site'' buildings like all the rest were slated for demolition. The Advisory Council on Historic Preservation (ACHP) toured the properties in November 1998. Most could not believe that the world's first atomic bomb was designed in such humble structures. The properties were declared to be ``monumental in their lack of monumentality.'' A Save America's Treasures grant for 700,000 was awarded to restore the properties. To raise the required matching funds, I left the Federal government and soon founded the Atomic Heritage Foundation. The presentation will trace the progress made over the last decade to generate interest and support nationwide to preserve the Manhattan Project heritage. Saving both the physical properties and first-hand accounts of the men and women have been a priority. Perhaps our most significant achievement may be legislation now under consideration by Congress to create a Manhattan Project National Historical Park. Seventy years later, the Manhattan Project is finally getting the recognition it deserves.

  12. Pension Fund

    CERN Multimedia

    2003-01-01

    Amendment No 19 to the Rules and Regulations of the Pension Fund has just been published and can be obtained from Divisional secretariats or, in the case of pensioners, directly from the Administration of the Fund (tel. 767-91 94/27 38), bldg 5, 1-030. This Amendment, which entered into force on 1.1.2003, concerns 1) the fixed sums and allowances adjusted at same date (Annex B) and 2) the articles which have been amended, in accordance with the Finance Committee's decision, regarding voting rules of the Governing Board and the role and composition of the Investment Committee.

  13. Consequences of bullying victimization in childhood and adolescence: A systematic review and meta-analysis

    Science.gov (United States)

    Moore, Sophie E; Norman, Rosana E; Suetani, Shuichi; Thomas, Hannah J; Sly, Peter D; Scott, James G

    2017-01-01

    AIM To identify health and psychosocial problems associated with bullying victimization and conduct a meta-analysis summarizing the causal evidence. METHODS A systematic review was conducted using PubMed, EMBASE, ERIC and PsycINFO electronic databases up to 28 February 2015. The study included published longitudinal and cross-sectional articles that examined health and psychosocial consequences of bullying victimization. All meta-analyses were based on quality-effects models. Evidence for causality was assessed using Bradford Hill criteria and the grading system developed by the World Cancer Research Fund. RESULTS Out of 317 articles assessed for eligibility, 165 satisfied the predetermined inclusion criteria for meta-analysis. Statistically significant associations were observed between bullying victimization and a wide range of adverse health and psychosocial problems. The evidence was strongest for causal associations between bullying victimization and mental health problems such as depression, anxiety, poor general health and suicidal ideation and behaviours. Probable causal associations existed between bullying victimization and tobacco and illicit drug use. CONCLUSION Strong evidence exists for a causal relationship between bullying victimization, mental health problems and substance use. Evidence also exists for associations between bullying victimization and other adverse health and psychosocial problems, however, there is insufficient evidence to conclude causality. The strong evidence that bullying victimization is causative of mental illness highlights the need for schools to implement effective interventions to address bullying behaviours. PMID:28401049

  14. Victimization Experiences and the Stabilization of Victim Sensitivity

    Directory of Open Access Journals (Sweden)

    Mario eGollwitzer

    2015-04-01

    Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.

  15. PENSION FUND

    CERN Multimedia

    2002-01-01

    The Governing Board of the Pension Fund held its 104th and 105th meetings on 8th November and 4th December 2001, respectively. The agenda of the 8th November meeting was devoted to a single item, namely the outcome of the Finance Committee's meeting the previous day. The Governing Board noted with satisfaction that both its proposed amendments to the Rules and Regulations of the Fund - allowing, in particular, the award of a deferred retirement pension after five years of service - and its proposal for the adjustment of pensions on 1.1.2002 had been approved for recommendation to the Council in December. At its meeting on 4th December, the Governing Board dealt mainly with the items examined at the latest meeting of the Investment Committee. The Committee's chairman, G. Maurin, stated that the 2001 return on the Fund's overall investments was likely to be between -2% and -3%. He also noted that a new study of the Fund's cash flows (incomings and outgoings) had been performed. He underlined that, while the flo...

  16. Pension Fund

    CERN Multimedia

    2006-01-01

    Following the approval by the CERN Council, at its Session in March 2006, of the amendments to Administrative Circular No. 14 (Protection of the members of the personnel against the financial consequences of illness, accident and disability) and the resulting amendments to the Rules and Regulations of the Pension Fund, which entered into force on 1st July 2006, the Administration of the Fund has decided to publish a complete new edition of the Rules and Regulations incorporating all amendments up to 1st July 2006. Members of the Fund will be informed once the new edition of the Rules and Regulations is available from Departmental secretariats.In the meantime, the amendments to the text of the Pension Fund Rules and Regulations, which entered into force on 1st July 2006, are presented below (Previous text/Amended text): Chapter II - Section 1: Contributions and benefits Article II 1.04 - Reference Salary - Part-time Work OLD TEXT: The reference salary of a member with a contract for part-time work shall b...

  17. Pension Fund

    CERN Multimedia

    2006-01-01

    Following the approval by the CERN Council, at its Session in March 2006, of the amendments to Administrative Circular No. 14 (Protection of the members of the personnel against the financial consequences of illness, accident and disability) and the resulting amendments to the Rules and Regulations of the Pension Fund, which entered into force on 1st July 2006, the Administration of the Fund has decided to publish a complete new edition of the Rules and Regulations incorporating all amendments up to 1st July 2006. Members of the Fund will be informed once the new edition of the Rules and Regulations is available from Departmental secretariats. In the meantime, the amendments to the text of the Pension Fund Rules and Regulations, which entered into force on 1st July 2006, are presented below (Previous text/Amended text) : Chapter II - Section 1: Contributions and benefits Article II 1.04 - Reference Salary - Part-time Work OLD TEXT: the reference salary of a member with a contract for part-time work shall be e...

  18. Report from the Pension Fund

    CERN Multimedia

    2012-01-01

    In this column, the Chairman of the Pension Fund Governing Board (PFGB) presents the Board's latest main decisions, initiatives and accomplishments to the Fund's members and beneficiaries.   Since my last report in July, the Fund has continued the implementation of its capital preservation approach with encouraging results. There have also been several communication events focusing, in particular, on the Fund’s governance and its investment processes. At the September sessions of the Finance Committee and Council, the Chairman of the Pension Fund Investment Committee, Dr Sigurd Lettow, gave comprehensive presentations on the governance and operations of the Fund’s Investment Committee. The Investment Committee is the subsidiary and expert body of the PFGB on investments. Its mandate is to define the process according to which the Fund’s assets - which amount to approximately 3.7 billion Swiss Francs - are invested, and to supervise the implem...

  19. Justice And Legal Certainty For Child Victims

    Directory of Open Access Journals (Sweden)

    Edi Setiadi

    2016-12-01

    Full Text Available Focus of attention in the criminal justice system so far has always been to the perpetrator, whereas parties related to a process of criminal justice encompasses the perpetrator, the victim, and the community. A crime victim, in particular, would suffer more since he/she could experience secondary victimization in the criminal justice system. The law concerning victim and witness protection only states the limitation for the criminal victim to ask for compensation to criminal justice system, either as a victim of direct criminal or a victim of abuse power done by law enforcement officers. Child victims are treated the same way as to adult victims, whilst they have a greater dimension of the problem and effects to be dealt with Mechanism and procedures to be followed are ius constituendum (intended/desirable law, as they only share expectation of indemnity, compensation, and rehabilitation which have not been empirically tested in a real situation.

  20. PENSION FUND

    CERN Multimedia

    2002-01-01

    Amendment No 18 to the Rules and Regulations of the Pension Fund has just been published and can be obtained from Divisional secretariats or, in the case of pensioners, directly from the Administration of the Fund (tel. 767-91 94/27 38), bldg 5, 1-030. This Amendment, which entered into force on 1.1.2002, concerns the articles which have been amended, in accordance with the Council's decision, to allow the award of a deferred retirement pension after five years of service (instead of ten previously) and the fixed sums and allowances adjusted at the same date (Annex B). It also contains a revised version of the table of contents of the Rules, as well as pages where the contents have not changed but where the page layout has had to be adjusted for technical reasons.

  1. Pension Fund

    CERN Multimedia

    Pension Fund

    2006-01-01

    Amendment No. 22 to the Rules and Regulations of the Pension Fund has just been published and can be obtained from Department/Unit secretariats or, in the case of pensioners, directly from the Administration of the Fund (tel. 767-91 94/27 38), bldg 5, 1-030. This Amendment, which entered into force following the CERN Council's decisions of 16 December 2005, includes the following new articles: Art. II 5.08 : Non-entitlement to Pension for Surviving Spouse Art. II 5.09 : Procurement of an entitlement to Pension for Surviving Spouse Art. II 6.09 : Non-entitlement to Pension for Orphans Art. II 7.01 c) : Entitlement to Allowances Art. III 1.07 : Extension of the contract beyond the age limit of 65 as well as the following amended articles : Article II 1.07 - Contributions Annex B - Fixed sums and allowances

  2. Exploring the Characteristics of Personal Victims Using the National Crime Victimization Survey

    National Research Council Canada - National Science Library

    Jairam, Shashi

    1998-01-01

    .... Two statistical methods were used to investigate these hypotheses, logistical regression for victimization prevalence, and negative binomial regression for victimization incidence and concentration...

  3. PENSION FUND

    CERN Multimedia

    Administration of the Fund

    2001-01-01

    The Administration of the Fund has just signed a contract with the 'La Suisse' insurance company, making life insurance available to persons leaving CERN under very similar conditions to those offered to the members of the CERN personnel. From now on, persons retiring from the Organization will be able to take out this new insurance at the moment of retirement, provided that they have been members of CERN's collective life insurance scheme for the last five years of service. Exceptionally, until the end of 2001, 'La Suisse' has agreed to allow persons who are already retired to take out this insurance, subject to their state of health (health questionnaire to be completed) and with a maximum insured amount set at 150,000 CHF. We therefore invite any retired persons interested in this insurance to consult the detailed terms and conditions, either on the Pension Fund's Web site (http://pensions.web.cern.ch/pensions) or by writing to the Administration of the Fund. For those wishing to apply, the documents to be...

  4. Pension Fund

    CERN Multimedia

    2004-01-01

    The Governing Board of the Pension Fund held its one-hundred-and-twenty-second meeting on 3 February 2004. Opening the meeting, the Chairman, J. Bezemer, welcomed W. Zapf's alternate T. Lagrange, A. Naudi's alternate P. Geeraert, and M. Goossens' alternate M. Vitasse, who were attending the Governing Board for the first time. The Governing Board heard a report from its Chairman on the meeting of the CERN Council on 19 December 2003, at which, under Pension Fund matters, the Council had approved a pensions adjustment of 0.7%. The Governing Board then heard a report on the main elements of the Investment Committee's meeting on 3 December 2003. During a presentation, Expert Timing System (Madrid) and the Compagnie de Trésorerie Benjamin de Rothschild (Geneva) had proposed a bond portfolio investment following the same quantitative investment principles as the equities portfolio they already managed for the Fund. After some deliberation, the Investment Committee had decided, on that basis, to award t...

  5. Pension Fund

    CERN Multimedia

    2003-01-01

    The Governing Board of the Pension Fund held its hundred and seventeenth meeting on 3 June 2003. On that occasion, it examined the recommendations made by the External Auditors in their report on their audit of the 2002 annual accounts and the replies by the Pension Fund's Administration. The Governing Board was gratified by the small number of remarks by the External Auditors. It also confirmed its agreement to the procedure followed by the Administration of the Pension Fund in the handling of transfer values. Under other items on the agenda, the Board once again examined ESO's request relating to the terms and conditions of membership by its staff members. In this regard, the Board wishes to receive from ESO a definitive request (following the necessary consultation procedures with the representatives of the personnel and discussions within ESO's governing bodies) so that the working group can continue its work on a clear basis and so that the Governing Board is in a position to take up a position in the m...

  6. Bullying and Victimization Among Children

    Science.gov (United States)

    Shetgiri, Rashmi

    2013-01-01

    Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839

  7. Entrapment of victims of spousal abuse in Ghana

    DEFF Research Database (Denmark)

    Adjei, Stephen Baffour

    2017-01-01

    Drawing on discursive psychology and positioning theory, this study explores the influence of cultural and familial value orientations on battered women’s identity, agency and decision to leave or stay in abusive conjugal relationship in Ghana. Two semi-structured focus group discussions and four...... in-depth personal interviews were conducted with 16 victims of husband-to-wife abuse from rural and urban Ghana. The findings indicate that entrapment of victims of spousal abuse in Ghana reflects their social embeddedness and that battered women’s identities and agency are expressed in the context...... of familial and cultural value orientations. The primacy of family identity and victims’ apparent implicit moral obligation to preserve the social image of their extended family influence their entrapment. Participants’ discursive accounts further suggest that stay/leave decisions of battered women in Ghana...

  8. Recalled Peritraumatic Reactions, Self-Reported PTSD, and the Impact of Malingering and Fantasy Proneness in Victims of Interpersonal Violence Who Have Applied for State Compensation

    Science.gov (United States)

    Kunst, Maarten; Winkel, Frans Willem; Bogaerts, Stefan

    2011-01-01

    The present study explores the associations between three types of peritraumatic reactions (dissociation, distress, and tonic immobility) and posttraumatic stress disorder (PTSD) symptoms in a sample of 125 victims of interpersonal violence who had applied for compensation with the Dutch Victim Compensation Fund (DCVF). In addition, the…

  9. Development of Pavement Performance Prediction Models for Preservation Treatments : Volume 2

    Science.gov (United States)

    2018-04-01

    The implementation of a pavement preservation program was initiated in Fiscal Year (FY) 2005 at the Illinois Department of Transportation (IDOT) by appropriating funding for four specific pavement preservation treatments. The types of treatments incl...

  10. Support groups for older victims of domestic violence.

    Science.gov (United States)

    Wolf, R S

    2001-01-01

    A 1997 nationwide (US and Canada) search to identify support groups for older victims of domestic violence located 16 sponsored by domestic violence programs and 14 sponsored by aging services. Interviews with group leaders indicated more similarities than differences between the two types of sponsorship in group purpose, leadership, numbers served, content of support group sessions, and success in accomplishing goals. Resistance of elders to participate in a group experience was cited by leaders as a major barrier. Recommendations for future groups include insuring accessibility of meeting site; using a leader and co-leader, at least one of whom is older or familiar with aging issues; allocating resources for recruitment; and seeking a steady source of funding. A policy of collaboration among the state's domestic violence coalition, state unit on aging, adult protective services, and victim assistance program may help in promoting support group development and utilization.

  11. Victims of cybercrime in Europe : a review of victim surveys

    NARCIS (Netherlands)

    Reep-van den Bergh, Carin M.M.; Junger, Marianne

    2018-01-01

    Objectives: Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods: We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected

  12. Shifting investments strategy from equity funds to money market funds – the case of Romanian open - end fund market during the financial crisis

    Directory of Open Access Journals (Sweden)

    Radu, I.

    2012-01-01

    Full Text Available Mutual funds are one of the key suppliers of liquidity in Romanian capital market. This paper uses quarterly data on Romanian open-end funds starting with 2006 until 2010. We find that significant negative flows (outflows were registered beginning with the end of 2007 (equity funds, during 2008 (equity funds, balanced funds, other funds and bond funds in the last 2 quarters of the year and from 2009 to 2010 (in the case of money market funds. There is evidence that the changing market conditions attract differently the incoming flows in these mutual funds. This is the reason why such perturbations affect investors’ confidence for these investment vehicles and impose the reorientation of the investment funds and of their investors to other alternatives in order to preserve their capital.

  13. PENSION FUND

    CERN Multimedia

    Administration of the Fund

    2001-01-01

    The Administration of the Fund has just signed a contract with the 'La Suisse' insurance company, making life insurance available to persons leaving CERN under very similar conditions to those offered to the members of the CERN personnel. From now on, persons retiring from the Organization will be able to take out this new insurance at the moment of retirement, provided that they have been members of CERN's collective life insurance scheme for the last five years of service. Exceptionally, until the end of 2001, 'La Suisse' has agreed to allow persons who are already retired to take out this insurance, provided that they are less than 70 years old and subject to their state of health (health questionnaire to be completed) and with a maximum insured amount set at 150,000 CHF. We therefore invite any retired persons interested in this insurance to consult the detailed terms and conditions, either on the Pension Fund's Web site (http://pensions.web.cern.ch/pensions) or contacting to the Administration of the Fun...

  14. Responding to Children Victimized by Their Peers

    Science.gov (United States)

    Nickerson, Amanda B.; Brock, Stephen E.; Chang, Yiping; O'Malley, Meagan D.

    2006-01-01

    Because victimization results from the dynamic interplay between the victim and his or her parents, peers, and teachers, responding to this problem should involve both direct and indirect interventions. This paper describes and reviews empirically supported direct interventions with victims, as well as indirect interventions with parents, peers,…

  15. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  16. Sexual victimization, partner aggression and alcohol consumption ...

    African Journals Online (AJOL)

    This paper examines the relationship sexual victimization (both childhood sexual victimization and adult sexual victimization), aggression and alcohol consumption. The data for this research is from the Gender, Alcohol and Culture: an International Study (GENACIS). A random sample of 2070 adults (53.8% males and ...

  17. Prevention of victimization following sexual assaults

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria; Sidenius, Katrine

    2004-01-01

    Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...... of women exposed to sexualized coercion and the diversity of perspectives on the events....

  18. Victimization Experiences and Adolescent Substance Use: Does the Type and Degree of Victimization Matter?

    OpenAIRE

    Pinchevsky, Gillian M.; Fagan, Abigail A.; Wright, Emily M.

    2013-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only asses...

  19. Victimization experiences and adolescent substance use: does the type and degree of victimization matter?

    Science.gov (United States)

    Pinchevsky, Gillian M; Fagan, Abigail A; Wright, Emily M

    2014-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only assess these relationships in the short-term using cross-sectional data. This study uses data from the Project on Human Development in Chicago Neighborhoods (PHDCN) to explore the impact of experiencing only indirect victimization, only direct victimization, both forms of victimization, and no victimization on substance use at two time points during adolescence. We find that of those adolescents who are victimized, the majority experience indirect victimization only, followed by experiencing both forms of victimization, and experiencing direct victimization only. Each of the victimization experiences were associated with increased contemporaneous substance use, with the strongest effects for those experiencing multiple forms of violence. For all victims, however, the impact on substance use declined over time.

  20. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet

  1. Pension fund

    CERN Multimedia

    Staff Association

    2014-01-01

    Letter sent on Monday 8 December 2014 to the delegates of the Member States to CERN Council An item on the agenda of the CERN Council of Thursday 11 December concerned the CERN Pension Fund, namely a discussion of a document that proposes how to respond to the many questions concerning pensions that had been submitted by thirteen Member State delegations. That document lists all these questions and proposes, as a first step, to consider the legal feasibility and the actuarial cost to transform our current defined-benefit pension scheme into a defined-contribution scheme. Once again, several delegates show their determination to worsen our pension conditions. The Staff Association’s Pension Commission, in a special meeting on Thursday, 4 December, has decided to send an open letter to the delegates of the CERN Council. In this letter (shown below) the Staff Association and CERN-ESO Pensions’ Association express their opposition to these intentions. We underline, once more, that the 2010...

  2. Imaging findings of avalanche victims

    Energy Technology Data Exchange (ETDEWEB)

    Grosse, Alexandra B.; Grosse, Claudia A.; Anderson, Suzanne [University Hospital of Berne, Inselspital, Department of Diagnostic, Pediatric and Interventional Radiology, Berne (Switzerland); Steinbach, Lynne S. [University of California San Francisco, Department of Radiology, San Francisco, CA (United States); Zimmermann, Heinz [University Hospital of Berne, Inselspital, Department of Trauma and Emergency Medicine, Berne (Switzerland)

    2007-06-15

    Skiing and hiking outside the boundaries remains an attractive wilderness activity despite the danger of avalanches. Avalanches occur on a relatively frequent basis and may be devastating. Musculoskeletal radiologists should be acquainted with these injuries. Fourteen avalanche victims (11 men and 3 women; age range 17-59 years, mean age 37.4 years) were air transported to a high-grade trauma centre over a period of 2 years. Radiographs, CT and MR images were prospectively evaluated by two observers in consensus. Musculoskeletal findings (61%) were more frequent than extraskeletal findings (39%). Fractures were most commonly seen (36.6%), involving the spine (14.6%) more frequently than the extremities (9.8%). Blunt abdominal and thoracic trauma were the most frequent extraskeletal findings. A wide spectrum of injuries can be found in avalanche victims, ranging from extremity fractures to massive polytrauma. Asphyxia remains the main cause of death along with hypoxic brain injury and hypothermia. (orig.)

  3. The dilemmas of victim positioning

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    2015-01-01

    Based on a conceptualization of bullying and relational aggression in groups as an effect of social dynamics rather than individual deficits – this article reflects upon some of the intricate mechanisms and dilemmas involved in victim positioning. Victims of bullying and relational aggression often....... The hopes of (eventual) social belonging may in that sense work paradoxically as a strong agent in the denial of oppression and marginalization. The article is theoretically informed by poststructuralist conceptualizations and grounded in cases of bullying and marginalization (one of them involving rape......). One case is taken from the empirical data produced by the author and a research project on bullying among children (eXbus: Exploring Bullying in School). Two other cases are borrowed from publications of respectively B. Davies from Australia and A. Evaldsson from Shweden. The article opens insights...

  4. Big Five Personality Traits of Cybercrime Victims.

    Science.gov (United States)

    van de Weijer, Steve G A; Leukfeldt, E Rutger

    2017-07-01

    The prevalence of cybercrime has increased rapidly over the last decades and has become part of the everyday life of citizens. It is, therefore, of great importance to gain more knowledge on the factors related to an increased or decreased likelihood of becoming a cybercrime victim. The current study adds to the existing body of knowledge using a large representative sample of Dutch individuals (N = 3,648) to study the relationship between cybercrime victimization and the key traits from the Big Five model of personality (i.e., extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience). First, multinomial logistic regression analyses were used to examine the associations between the personality traits and three victim groups, that is, cybercrime victims versus nonvictims, traditional crime victims versus nonvictims, and cybercrime victims versus traditional crime victims. Next, logistic regression analyses were performed to predict victimization of cyber-dependent crimes (i.e., hacking and virus infection) and cyber-enabled crimes (i.e., online intimidation, online consumer fraud, and theft from bank account). The analyses show that personality traits are not specifically associated with cybercrime victimization, but rather with victimization in general. Only those with higher scores on emotional stability were less likely to become a victim of cybercrime than traditional crime. Furthermore, the results indicate that there are little differences between personality traits related to victimization of cyber-enabled and cyber-dependent crimes. Only individuals with higher scores on openness to experience have higher odds of becoming a victim of cyber-enabled crimes.

  5. Mean ages of homicide victims and victims of homicide-suicide.

    Science.gov (United States)

    Bridges, F Stephen; Tankersley, William B

    2010-02-01

    Using Riedel and Zahn's 1994 reformatted version of an FBI database, the mean age of homicide victims in 2,175 homicide-suicides (4,350 deaths) was compared with that of all other victims of homicides reported for the USA from 1968 to 1975. The overall mean age of homicide victims in homicide-suicides was 1 yr. greater than for victims of homicides not followed by suicides, whereas the mean age for both male and female homicide-suicide victims was, respectively, 3 yr. less and greater than the other homicide victims. The mean age of Black homicide victims of homicide-suicides was 2.4 yr. less than that for Black victims of other homicides, whereas the means for Black and White male homicide victims in homicide-suicides were, respectively, about 4 and 5 yr. less than for victims of other homicides. Also, the mean age of White female homicide victims in homicide-suicides was more than two years greater than for female victims of homicides not followed by suicides. When both sex and race were considered, the mean age for those killed in homicide-suicides relative to those killed in homicides not followed by suicides may represent subpopulations with different mean ages of victims.

  6. Problems of realization of the rights of victims of crimes to compensation by the state

    Directory of Open Access Journals (Sweden)

    Н. А. Хмельова

    2015-05-01

    Full Text Available Problem setting: consider the problems of realization of the rights of victims of crime persons to compensation by the State under the laws of Ukraine. To analyze the current civil legislation of Ukraine, to consider the legislation of the countries in terms of state compensation for damages caused to the victim crime. Suggest a mechanism to implement them. Recent research and publications analysis: some aspects of state compensation for harm caused to the victim crime investigated by many scientists. Thus, O. Vedernikova, O. Kuchinska, A. Mazalov, V. Sawickiy in his scientific studies have concentrated on the investigation of the creation of a state fund damages caused offense. R. Abramovich’s work explored the issue of compensation to the victim harm caused by crime as a legal obligation of the State on the basis of mutual responsibility of the citizen to the state and the state before a national. D. Plachkov investigated features of state obligations arising from causing offense, the specific legal solution of the relations in Ukraine. Paper objective: identifying challenges the rights of victims of crime persons to compensation by the state will set features the state’s obligations arising from causing crime and identify ways to improve the legal regulation of the relations in Ukraine. Paper main body: the current civil legislation of Ukraine stipulates the right of victims of criminal offenses on the restoration of rights violations. But there are cases where recovery is impossible. The reasons for this is that, first, is guilty of a criminal offense a person is insolvent, and the actual recovery of funds it usually extends over many years and is irregular. Secondly, the problem relates stopped criminal proceedings in which a person has committed a criminal offense is not established and the victim is deprived of right to file a civil action. Thirdly, the remedy is not possible victims in unsolved criminal offenses, such as when a

  7. Victim's Rights - Comparative Approach within EU Legislation

    Directory of Open Access Journals (Sweden)

    Monica Pocora

    2015-12-01

    Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.

  8. How to become a victim of crime

    OpenAIRE

    Богдан Миколайович Головкін

    2017-01-01

    Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1) the emergence of criminal threats; 2) increasing the degree of social vulnerability to criminal assault; 3) the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations); 4) increase the number of victims of crimes as regis...

  9. Victimization, polyvictimization , and health in Swedish adolescents

    Directory of Open Access Journals (Sweden)

    Aho N

    2016-08-01

    Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC

  10. Bullies and Victims: A Phenomenological Study

    Science.gov (United States)

    Omizo, Michael M.; Omizo, Sharon A.; Baxa, Gari-Vic C. O.; Miyose, Ross J.

    2006-01-01

    This study presents the results of a phenomenological study with sixteen elementary school children identified as bullies or victims. Implications for school counselors and educators are also discussed.

  11. The victim of the nuclear accident

    International Nuclear Information System (INIS)

    Carvalho, A.B. de.

    1990-01-01

    This paper shows the effects of the nuclear accident in the victims, in their lives, changes in the behaviour, neurosis including all the psychological aspects. The author compare the victims with nuclear accident like AIDS patients, in terms of people's discrimination. There is another kind of victims. They are the people who gave helpness, for example physicians, firemen and everybody involved with the first aids that suffer together with the victims trying to safe them and to diminish their suffering, combating the danger, the discrimination and the no information. (L.M.J.)

  12. Identifying bully victims: definitional versus behavioral approaches.

    Science.gov (United States)

    Green, Jennifer Greif; Felix, Erika D; Sharkey, Jill D; Furlong, Michael J; Kras, Jennifer E

    2013-06-01

    Schools frequently assess bullying and the Olweus Bully/Victimization Questionnaire (BVQ; Olweus, 1996) is the most widely adopted tool for this purpose. The BVQ is a self-report survey that uses a definitional measurement method--describing "bullying" as involving repeated, intentional aggression in a relationship where there is an imbalance of power and then asking respondents to indicate how frequently they experienced this type of victimization. Few studies have examined BVQ validity and whether this definitional method truly identifies the repetition and power differential that distinguish bullying from other forms of peer victimization. This study examined the concurrent validity of the BVQ definitional question among 435 students reporting peer victimization. BVQ definitional responses were compared with responses to a behavioral measure that did not use the term "bullying" but, instead, included items that asked about its defining characteristics (repetition, intentionality, power imbalance). Concordance between the two approaches was moderate, with an area under the receiver operating curve of .72. BVQ responses were more strongly associated with students indicating repeated victimization and multiple forms of victimization, than with power imbalance in their relationship with the bully. Findings indicate that the BVQ is a valid measure of repeated victimization and a broad range of victimization experiences but may not detect the more subtle and complex power imbalances that distinguish bullying from other forms of peer victimization. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  13. Bullies, Victims, and Bully/Victims: Distinct Groups of At-Risk Youth.

    Science.gov (United States)

    Haynie, Denise L.; Nasel, Tonja; Eitel, Patricia; Crump, Aria Davis; Saylor, Keith; Yu, Kai; Simons-Morton, Bruce

    2001-01-01

    Surveyed middle school students on incidents of bullying and victimization. Found that psychosocial and behavioral predictors such as problem behaviors, attitudes toward deviance, peer influences, depressive symptoms, school-related functioning, and parenting linearly separated never bullied or victimized students from the victim group, from the…

  14. Moral Reasoning and Emotion Attributions of Adolescent Bullies, Victims, and Bully-Victims

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-01-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…

  15. Performance Evaluations and Victim Satisfaction With State Compensation for Violent Crime: A Prospective Study.

    Science.gov (United States)

    Kunst, M J J; Koster, N N; Van Heugten, J

    2015-07-29

    Satisfaction with a particular good or service represents an affective state in response to an individual's evaluation of the performance of that good or service. This evaluation involves a comparison between perceived actual performance and prior expectations. The current study used this theoretical idea to study violent crime victims' levels of satisfaction with services provided by a Dutch state compensation scheme. One hundred and seventy-seven victims of violent crime who had applied for compensation from the Dutch Violent Offences Compensation Fund (DVOCF) participated in two brief telephone interviews: one before receipt of the fund's decision upon their request for compensation and one after receipt of that decision. Based on the theories of distributive and procedural justice, measurement of prior expectations was differentiated in expectations about receipt of compensation, treatment by fund workers, and information provision. Results suggested that satisfaction with the DVOCF depended on fulfillment of expectations about treatment by fund workers and information provision, but not on fulfillment of expectations about receipt of compensation. Other predictors of victim satisfaction were as follows: duration of the application procedure, approval upon request for compensation, and satisfaction assessed during the first interview. Results were discussed in light of theory, policy implications, study limitations, and future research. © The Author(s) 2015.

  16. Danish mutual fund performance

    DEFF Research Database (Denmark)

    Christensen, Michael

    2013-01-01

    This article provides the first independent performance analysis of Danish mutual funds. We analyse selectivity and market timing abilities for 71 mutual funds that have been in operation from 2001 to 2010. The results show great fund performance diversity. Half the funds have performed neutrally......, whereas 42% of the funds have shown significantly negative performance and only 7% of the funds have over-performed their benchmark. Furthermore, 14% of the funds analysed possess market timing abilities, but for 8 out of 10 funds, their market timing ability has been unsuccessful....

  17. Amazon Fund: financing deforestation avoidance

    Directory of Open Access Journals (Sweden)

    Jacques Marcovitch

    2014-06-01

    Full Text Available The Amazon Fund, created in 2008 by the Brazilian Federal Government, is managed by Banco Nacional de Desenvolvimento Econômico e Social (BNDES. It is a pioneering initiative to fundraise and manage financial resources to cut back deforestation and support sustainable development for 30 million inhabitants in the Amazon Biome. The Amazon Fund has already received more than R$ 1.7 billion in grants (about USD 787 million. This essay analyzes the Amazon Fund's governance and management with focus on its operation and from its stakeholders' perspectives. A combination of research methods includes: documental research, in-depth interviews, and speech analysis. The study offers a comparative analysis of strengths and weaknesses related to its governance. Furthermore, it proposes ways to improve its management towards greater effectiveness. The essay also includes an assessment of the government of Norway, a major donor to the fund. The governments of Norway and Germany, in partnership with Brazil, reveal how important it is to experiment with new means of international cooperation to successfully reduce greenhouse gas emissions through rainforest preservation.

  18. Direct-to-PCR tissue preservation for DNA profiling.

    Science.gov (United States)

    Sorensen, Amy; Berry, Clare; Bruce, David; Gahan, Michelle Elizabeth; Hughes-Stamm, Sheree; McNevin, Dennis

    2016-05-01

    Disaster victim identification (DVI) often occurs in remote locations with extremes of temperatures and humidities. Access to mortuary facilities and refrigeration are not always available. An effective and robust DNA sampling and preservation procedure would increase the probability of successful DNA profiling and allow faster repatriation of bodies and body parts. If the act of tissue preservation also released DNA into solution, ready for polymerase chain reaction (PCR), the DVI process could be further streamlined. In this study, we explored the possibility of obtaining DNA profiles without DNA extraction, by adding aliquots of preservative solutions surrounding fresh human muscle and decomposing human muscle and skin tissue samples directly to PCR. The preservatives consisted of two custom preparations and two proprietary solutions. The custom preparations were a salt-saturated solution of dimethyl sulfoxide (DMSO) with ethylenediaminetetraacetic (EDTA) and TENT buffer (Tris, EDTA, NaCl, Tween 20). The proprietary preservatives were DNAgard (Biomatrica(®)) and Tissue Stabilising Kit (DNA Genotek). We obtained full PowerPlex(®) 21 (Promega) and GlobalFiler(®) (Life Technologies) DNA profiles from fresh and decomposed tissue preserved at 35 °C for up to 28 days for all four preservatives. The preservative aliquots removed from the fresh muscle tissue samples had been stored at -80 °C for 4 years, indicating that long-term archival does not diminish the probability of successful DNA typing. Rather, storage at -80 °C seems to reduce PCR inhibition.

  19. Preserving Digital Materials

    CERN Document Server

    Harvey, Ross

    2011-01-01

    This book provides a single-volume introduction to the principles, strategies and practices currently applied by librarians and recordkeeping professionals to the critical issue of preservation of digital information. It incorporates practice from both the recordkeeping and the library communities, taking stock of current knowledge about digital preservation and describing recent and current research, to provide a framework for reflecting on the issues that digital preservation raises in professional practice.

  20. Rating mutual funds

    DEFF Research Database (Denmark)

    Bechmann, Ken L.; Rangvid, Jesper

    2007-01-01

    We develop a new rating of mutual funds: the atpRating. The atpRating assigns crowns to each individual mutual fund based upon the costs an investor pays when investing in the fund in relation to what it would cost to invest in the fund's peers. Within each investment category, the rating assigns...... the return of a fund in a certain year generally contains only little information about the future return that the fund will generate. Finally, we have information on the investments in different mutual funds made by a small subgroup of investors known to have been exposed to both the atp...... five crowns to funds with the lowest costs and one crown to funds with the highest costs. We investigate the ability of the atpRating to predict the future performance of a fund. We find that an investor who has invested in the funds with the lowest costs within an investment category would have...

  1. Reporting Crime Victimizations to the Police and the Incidence of Future Victimizations: A Longitudinal Study.

    Science.gov (United States)

    Ranapurwala, Shabbar I; Berg, Mark T; Casteel, Carri

    2016-01-01

    Law enforcement depends on cooperation from the public and crime victims to protect citizens and maintain public safety; however, many crimes are not reported to police because of fear of repercussions or because the crime is considered trivial. It is unclear how police reporting affects the incidence of future victimization. To evaluate the association between reporting victimization to police and incident future victimization. We conducted a retrospective cohort study using National Crime Victimization Survey 2008-2012 data. Participants were 12+ years old household members who may or may not be victimized, were followed biannually for 3 years, and who completed at least one follow-up survey after their first reported victimization between 2008 and 2012. Crude and adjusted generalized linear mixed regression for survey data with Poisson link were used to compare rates of future victimization. Out of 18,657 eligible participants, 41% participants reported to their initial victimization to police and had a future victimization rate of 42.8/100 person-years (PY) (95% CI: 40.7, 44.8). The future victimization rate of those who did not report to the police (59%) was 55.0/100 PY (95% CI: 53.0, 57.0). The adjusted rate ratio comparing police reporting to not reporting was 0.78 (95%CI: 0.72, 0.84) for all future victimizations, 0.80 (95% CI: 0.72, 0.90) for interpersonal violence, 0.73 (95% CI: 0.68, 0.78) for thefts, and 0.95 (95% CI: 0.84, 1.07) for burglaries. Reporting victimization to police is associated with fewer future victimization, underscoring the importance of police reporting in crime prevention. This association may be attributed to police action and victim services provisions resulting from reporting.

  2. Legal protection of victims of domestic violence in Republika Srpska

    Directory of Open Access Journals (Sweden)

    Marković Ivanka

    2008-01-01

    violence. However, the author emphasizes that, despite such normative solutions, we still cannot talk about some important results achieved in the area of combat and prevention of domestic violence. Therefore, a wide-scope action was initiated on the territory of Republika Srpska in the direction not only of combating of family violence, but also finding and eradication of reasons and causes of negative social manifestation. The final goal of this activity is protection of victims, prevention of violence and preservation of a healthy family as a basis of society.

  3. Environmental education on wood preservatives and preservative ...

    African Journals Online (AJOL)

    The development and use of wood preservatives in Nigeria should address not only the cost and demand functions but also the potential hazards in environmental equations. Forest products specialists are often asked about the perceived risks and environmental costs of treated wood products. Evidently, the civil society is ...

  4. Symbolic Victimization and Real World Fear.

    Science.gov (United States)

    Morgan, Michael

    1983-01-01

    Examines the relationship between victimization of characters in television drama and susceptibility to the viewers' cultivation of a sense of personal risk in the real world. Found that viewers whose fictional counterparts are more likely to be shown as victims show stronger associations between viewing and perceived vulnerability. (PD)

  5. Debate of victims studies. 1. ed.

    International Nuclear Information System (INIS)

    Kosovski, E.; Piedade Junior, H.; Mayr, E.

    1990-01-01

    This book shows some aspects and the effects of several types of accidents in the victims, including the psychological considerations, changes in theirs behaviour, concepts, clinical diagnostic, etc. Victims of nuclear, transit terrorism and work accidents are studied. (C.G.C.)

  6. Relational Aggression and Victimization in College Students

    Science.gov (United States)

    Dahlen, Eric R.; Czar, Katherine A.; Prather, Emily; Dyess, Christy

    2013-01-01

    For this study we explored relational aggression and victimization in a college sample (N = 307), examining potential gender and race differences, correlates, and the link between relational aggression and common emotional and behavioral problems, independent of relational victimization. Gender and race differences were observed on relational…

  7. Emergency Care of the Snakebite Victim.

    Science.gov (United States)

    Ballard, Carol N.

    1994-01-01

    Describes emergency care of snakebite victims, including noting signs and symptoms of venomous snakebites, keeping the victim calm, and seeking immediate medical attention. Provides information on variables that affect the amount of injected venom and how to distinguish nonpoisonous from poisonous snakes. (LP)

  8. Male Rape Victim and Perpetrator Blaming

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2010-01-01

    One of four possible vignettes manipulated by (a) level of rape myth contained within them (low vs. high) and (b) type of rape (stranger vs. acquaintance) was presented to participants followed by scales measuring victim blame, perpetrator blame, belief in a just world, sex-role egalitarian beliefs, and male rape myth acceptance. Victim blaming…

  9. ASD and PTSD in Rape Victims

    Science.gov (United States)

    Elklit, Ask; Christiansen, Dorte M.

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims shortly after the rape or attempted rape. The PTSD…

  10. Teacher Victimization in Authoritative School Environments

    Science.gov (United States)

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  11. Trafficking in persons : A victim's perspective

    NARCIS (Netherlands)

    Rijken, Conny; Rijken, Conny; Piotrowicz, Ryszard; Uhl, Baerbel Heide

    2017-01-01

    Historically, protection and assistance to victims of human trafficking in many countries is anchored in migration law and dependent on whether or not a residence permit is granted to the victim. Apart from some limited exceptions, cooperation with law enforcement authorities in criminal

  12. BlogForever: Intelligent Blog Preservation

    CERN Multimedia

    Katarina Anthony

    2011-01-01

    A new EU co-funded project, BlogForever, has set its sights on a developing region of the Internet: the blogosphere. With society growing ever more online-oriented, blogs have become rich repositories of cultural, scientific and social information. The BlogForever software platform is designed to manage and distribute this content and preserve it for posterity.   The BlogForever project will gather blog content into a safeguarded, online archive, turning the once temporary into a well-preserved resource. The project is scheduled for completion in 2013, with partners spread across 12 different companies, universities and research organisations, including CERN. While the CERN team is primarily involved in the technical aspect of the project – designing and implementing the repository – it will also contribute to the preservation guidelines that will be used to choose what content will be kept. “Building on the success of Invenio, the digital library software used by th...

  13. Sexual minority youth victimization and social support: the intersection of sexuality, gender, race, and victimization.

    Science.gov (United States)

    Button, Deeanna M; O'Connell, Daniel J; Gealt, Roberta

    2012-01-01

    In comparison to heterosexual youth, sexual minority youth are more likely to experience victimization. Multiple studies have connected anti-gay prejudice and anti-gay victimization to negative outcomes. Research shows that social support may protect sexual minorities from the harmful effects of anti-gay victimization. However, rates of victimization and the negative outcomes linked to sexual identity within the sexual minority community have been relatively unexplored. Using data from three years of statewide data from heterosexual and sexual minority adolescents in grades 9-12, this study examines victimization, substance use, suicidality, and access to social support by sexuality. Results indicate that sexual minority youth are at increased risk for victimization, substance use, suicidality, and social isolation compared to their heterosexual counterparts. Results also indicate that there is very little bivariate difference within the sexual minority community. Multivariate results indicate differences among sexual minorities' experiences with victimization and substance use.

  14. Picking Funds with Confidence

    DEFF Research Database (Denmark)

    Grønborg, Niels Strange; Lunde, Asger; Timmermann, Allan

    We present a new approach to selecting active mutual funds that uses both holdings and return information to eliminate funds with predicted inferior performance through a sequence of pair-wise comparisons. Our methodology determines both the number of skilled funds and their identity, funds...... identified ex-ante as being superior earn substantially higher risk-adjusted returns than top funds identified by conventional alpha ranking methods. Importantly, we find strong evidence of variation in the breadth of the set of funds identified as superior, as well as fluctuations in the style and industry...... exposures of such funds over time and across different volatility states....

  15. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...

  16. Modes of fossil preservation

    Science.gov (United States)

    Schopf, J.M.

    1975-01-01

    The processes of geologic preservation are important for understanding the organisms represented by fossils. Some fossil differences are due to basic differences in organization of animals and plants, but the interpretation of fossils has also tended to be influenced by modes of preservation. Four modes of preservation generally can be distinguished: (1) Cellular permineralization ("petrifaction") preserves anatomical detail, and, occasionally, even cytologic structures. (2) Coalified compression, best illustrated by structures from coal but characteristic of many plant fossils in shale, preserves anatomical details in distorted form and produces surface replicas (impressions) on enclosing matrix. (3) Authigenic preservation replicates surface form or outline (molds and casts) prior to distortion by compression and, depending on cementation and timing, may intergrade with fossils that have been subject to compression. (4) Duripartic (hard part) preservation is characteristic of fossil skeletal remains, predominantly animal. Molds, pseudomorphs, or casts may form as bulk replacements following dissolution of the original fossil material, usually by leaching. Classification of the kinds of preservation in fossils will aid in identifying the processes responsible for modifying the fossil remains of both animals and plants. ?? 1975.

  17. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Labots, H.; Huis in 't Veld, G.J.P.; Verrips, C.T.

    1985-01-01

    After a review of several methods for the preservation of food and the routes of food infections, the following chapters are devoted to the preservation by irradiation. Applications and legal aspects of food irradiation are described. Special reference is made to the international situation. (Auth.)

  18. Rating Mutual Funds

    DEFF Research Database (Denmark)

    Bechmann, Ken L.; Rangvid, Jesper

    We develop a new rating of mutual funds: the atpRating. The atpRating assigns crowns to each individual mutual fund based upon the costs an investor pays when investing in the fund in relation to what it would cost to invest in the fund’s peers. Within each investment category, the rating assigns......, whereas the return of a fund in a certain year generally contains only little information about the future return that the fund will generate. Finally, we have information on the investments in different mutual funds made by a small subgroup of investors known to have been exposed to both the atp...... five crowns to funds with the lowest costs and one crown to funds with the highest costs. We investigate the ability of the atpRating to predict the future performance of a fund. We find that an investor who has invested in the funds with the lowest costs within an investment category would have...

  19. Towards Interoperable Preservation Repositories: TIPR

    Directory of Open Access Journals (Sweden)

    Priscilla Caplan

    2010-07-01

    Full Text Available Towards Interoperable Preservation Repositories (TIPR is a project funded by the Institute of Museum and Library Services to create and test a Repository eXchange Package (RXP. The package will make it possible to transfer complex digital objects between dissimilar preservation repositories.  For reasons of redundancy, succession planning and software migration, repositories must be able to exchange copies of archival information packages with each other. Every different repository application, however, describes and structures its archival packages differently. Therefore each system produces dissemination packages that are rarely understandable or usable as submission packages by other repositories. The RXP is an answer to that mismatch. Other solutions for transferring packages between repositories focus either on transfers between repositories of the same type, such as DSpace-to-DSpace transfers, or on processes that rely on central translation services.  Rather than build translators between many dissimilar repository types, the TIPR project has defined a standards-based package of metadata files that can act as an intermediary information package, the RXP, a lingua franca all repositories can read and write.

  20. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  1. Self-preserving cosmetics.

    Science.gov (United States)

    Varvaresou, A; Papageorgiou, S; Tsirivas, E; Protopapa, E; Kintziou, H; Kefala, V; Demetzos, C

    2009-06-01

    Preservatives are added to products for two reasons: first, to prevent microbial spoilage and therefore to prolong the shelf life of the product; second, to protect the consumer from a potential infection. Although chemical preservatives prevent microbial growth, their safety is questioned by a growing segment of consumers. Therefore, there is a considerable interest in the development of preservative-free or self-preserving cosmetics. In these formulations traditional/chemical preservatives have been replaced by other cosmetic ingredients with antimicrobial properties that are not legislated as preservatives according to the Annex VI of the Commission Directive 76/768/EEC and the amending directives (2003/15/EC, 2007/17/EC and 2007/22/EC). 'Hurdle Technology', a technology that has been used for the control of product safety in the food industry since 1970s, has also been applied for the production of self-preserving cosmetics. 'Hurdle Technology' is a term used to describe the intelligent combination of different preservation factors or hurdles to deteriorate the growth of microorganisms. Adherence to current good manufacturing practice, appropriate packaging, careful choice of the form of the emulsion, low water activity and low or high pH values are significant variables for the control of microbial growth in cosmetic formulations. This paper describes the application of the basic principles of 'Hurdle Technology' in the production of self-preserving cosmetics. Multifunctional antimicrobial ingredients and plant-derived essential oils and extracts that are used as alternative or natural preservatives and are not listed in Annex VI of the Cosmetic Directive are also reported.

  2. To Not Only Being Victims

    Directory of Open Access Journals (Sweden)

    Stefania Fantauzzi

    2017-11-01

    Full Text Available Hannah Arendt is against the idea that Jews were only the victims of history. Starting from the idea that the Age of Enlightenment and the Jewish emancipation put the Jewish tradition and history in crisis, she is adamant that this same history is not only full of suffering, but includes  a hidden tradition of activism that is important to uncover and to claim. The aim of these pages is to analyse the Arendtian thinking of the 30s and 40s in order to show some elements that can help us to understand what the loss of humanity means today and to indicate the possibilities of claiming and recovering it.

  3. Moral reasoning and emotion attributions of adolescent bullies, victims, and bully-victims.

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-11-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents aged 12-18 (57% females) reported the frequency of involvement in bullying and victimization. Participants were categorized as bullies (14.3%), bully-victims (3.9%), and victims (9.7%). Moral judgment, moral justifications, and emotion attributions to a hypothetical perpetrator of a moral transgression (relational aggression) were assessed. Bullies showed more morally disengaged reasoning than non-involved students. Bully-victims more frequently indicated that violating moral rules is right. Victims produced more victim-oriented justifications (i.e., more empathy) but fewer moral rules. Among victims, the frequency of morally responsible justifications decreased and the frequency of deviant rules increased with age. The findings are discussed from an integrative moral developmental perspective. ©2011 The British Psychological Society.

  4. When and Why We See Victims as Responsible: The Impact of Ideology on Attitudes Toward Victims.

    Science.gov (United States)

    Niemi, Laura; Young, Liane

    2016-09-01

    Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.

  5. Crime victims in the criminal justice system

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2003-01-01

    Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.

  6. Chronopolis Digital Preservation Network

    Directory of Open Access Journals (Sweden)

    David Minor

    2010-07-01

    Full Text Available The Chronopolis Digital Preservation Initiative, one of the Library of Congress’ latest efforts to collect and preserve at-risk digital information, has completed its first year of service as a multi-member partnership to meet the archival needs of a wide range of domains.Chronopolis is a digital preservation data grid framework developed by the San Diego Supercomputer Center (SDSC at UC San Diego, the UC San Diego Libraries (UCSDL, and their partners at the National Center for Atmospheric Research (NCAR in Colorado and the University of Maryland's Institute for Advanced Computer Studies (UMIACS.Chronopolis addresses a critical problem by providing a comprehensive model for the cyberinfrastructure of collection management, in which preserved intellectual capital is easily accessible, and research results, education material, and new knowledge can be incorporated smoothly over the long term. Integrating digital library, data grid, and persistent archive technologies, Chronopolis has created trusted environments that span academic institutions and research projects, with the goal of long-term digital preservation.A key goal of the Chronopolis project is to provide cross-domain collection sharing for long-term preservation. Using existing high-speed educational and research networks and mass-scale storage infrastructure investments, the partnership is leveraging the data storage capabilities at SDSC, NCAR, and UMIACS to provide a preservation data grid that emphasizes heterogeneous and highly redundant data storage systems.In this paper we will explore the major themes within Chronopolis, including:a The philosophy and theory behind a nationally federated data grid for preservation. b The core tools and technologies used in Chronopolis. c The metadata schema that is being developed within Chronopolis for all of the data elements. d Lessons learned from the first year of the project.e Next steps in digital preservation using Chronopolis: how we

  7. Optimization of preservation activities and preservation engineering (1)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the relation between general society and preservation, the content and the structure of preservation activities, and the viewpoint and the approach of the optimization of the preventive preservation are described. The optimization of the preventive preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  8. Preservation of Built Environments

    DEFF Research Database (Denmark)

    Pilegaard, Marie Kirstine

    When built environments and recently also cultural environments are to be preserved, the historic and architectural values are identified as the key motivations. In Denmark the SAVE system is used as a tool to identify architectural values, but in recent years it has been criticized for having...... architectural value in preservation work as a matter of maintaining the buildings -as keeping them "alive" and allowing this to continue in the future. The predominantly aesthetic preservation approach will stop the buildings' life process, which is the same as - "letting them die". Finnebyen in Aarhus...... is an example of a residential area, where the planning authority currently has presented a preservational district plan, following guidelines from the SAVE method. The purpose is to protect the area's architectural values in the future. The predominantly aesthetic approach is here used coupled to the concept...

  9. Radiation preservation of maize

    International Nuclear Information System (INIS)

    Wasito.

    1980-01-01

    Radiation preservation of maize was carried out. Radiation doses and sources, shielding materials, packaging materials, chemical radiation effects, biological radiation effects, were discussed. Experimental methods, samples and accessories were also presented. (SMN)

  10. A victim-centered approach to justice? Victim satisfaction effects on third-party punishments.

    Science.gov (United States)

    Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M

    2012-10-01

    Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  11. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  12. Indiana Pavement Preservation Program

    OpenAIRE

    Ong, Ghim Ping (Raymond); Nantung, Tommy E.; Sinha, Kumares C.

    2010-01-01

    State highway agencies are facing immense pressure to maintain roads at acceptable levels amidst the challenging financial and economic situations. In recent years, pavement preservation has been sought as a potential alternative for managing the pavement assets, believing that it would provide a cost-effective solution in maintaining infrastructural conditions and meeting user expectations. This study explores the potential of pavement preservation concepts in managing the agency‘s pavement ...

  13. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  14. Predictors and protective factors for adolescent Internet victimization

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving

    2012-01-01

    To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....

  15. Victims of Rape: Repeated Assessment of Depressive Symptoms.

    Science.gov (United States)

    Atkeson, Beverly M.; And Others

    1982-01-01

    Investigated depressive symptoms in rape victims (N=115) for one year following their assaults. Depressive symptoms were higher in victims than in controls. By four months postrape, depressive symptoms in the victim group had diminished, and the victims were no longer significantly different from the nonvictim control group. (Author)

  16. The funding black hole

    CERN Multimedia

    2008-01-01

    Two physics students at the University of Bristol have organised a petition against the recently-announced funding cut of 80 million by the body that funds physics research in the UK, the Science and Technology Facilities Council (STFC).

  17. Fanconi Anemia Research Fund

    Science.gov (United States)

    ... Support Publications Fundraising News What is the Fanconi Anemia Research Fund? Fanconi anemia is an inherited disease that can lead to ... population. Lynn and Dave Frohnmayer started the Fanconi Anemia Research Fund, in 1989 to find effective treatments ...

  18. Cyber socializing and victimization of women

    Directory of Open Access Journals (Sweden)

    Halder Debarati

    2009-01-01

    Full Text Available Web 2.01 has redefined the virtual life of ordinary individuals and has given wide opportunities to internet users including women to exchange ideas, interact with like minded people and participate in the development of virtual societies as per one's own choices. Social networking websites (SNWs, a segment of Web 2.0 is very popular among the internet users. However, there is a dark side of these SNW's too. They have become havens for offenders to victimize women, the most vulnerable targets in the internet, after children. In this paper, we examine the victimization of women in the social networking websites in general, analyze the trends of such victimization from socio - legal - victimological angle and ascertain the reasons for the growth of such victimization.

  19. A new award for the CERN Pension Fund

    CERN Multimedia

    CERN Bulletin

    2013-01-01

    Recently, the CERN Pension Fund was awarded the 2013 Investment and Pensions Europe (IPE) Award for “Best Use of Equities”. IPE is the leading European Pension Fund industry publication.   The award recognized CERN’s implementation of capital preservation principles in equities, referring in particular to CERN’s innovation with the development of “asymmetric” equity strategies. The awards were judged by a panel of 65 European pension fund executives, experts and consultants. In addition, CERN was selected by the judges as a finalist for “Best Public Pension Fund” in Europe.  This award was won by the UK government’s Pension Protection Fund.

  20. La victime, acteur de la sécurité ? / The victim, a security actor ?

    Directory of Open Access Journals (Sweden)

    Dieu François

    2012-08-01

    Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.

  1. Stop Harassment!: men's reactions to victims' confrontation

    OpenAIRE

    Carmen Herrera, M.; Herrera, Antonio; Expósito, Francisca

    2014-01-01

    Sexual harassment is one of the most widespread forms of gender violence. Perceptions of sexual harassment depend on gender, context, the perceivers' ideology, and a host of other factors. Research has underscored the importance of coping strategies in raising a victim's self-confidence by making her feel that she plays an active role in overcoming her own problems. The aim of this study was to assess the men's perceptions of sexual harassment in relation to different victim responses. The st...

  2. Pension funds' herding

    NARCIS (Netherlands)

    Broeders, D.; Chen, D.; Minderhoud, P.; Schudel, W.

    2016-01-01

    This paper uses unique and detailed transaction data to analyse herding behavior among pension funds. We distinguish between weak, semi strong and strong herding behaviour. Weak herding occurs if pension funds have similar rebalancing strategies. Semi strong herding arises when pension funds react

  3. Incendiari e vittime / Arsonists and Victims / Incendiaires et victimes

    Directory of Open Access Journals (Sweden)

    Roberta Bisi

    2008-04-01

    Full Text Available Human beings need fire !Contrary to other living beings, mankind could not live without fire so it is quite astonishing to observe that most of the fires which burn on the earth are caused by man.Many fires spread all over the North Mediterranean area, from Portugal to Turkey, during the summer 2007.Human beings and fire: associated to the sacrifice of Titan Prometheus which was meant to be a sort of pattern to be followed by men to honour the gods.Fire is alive like water and air but it is difficult to capture it with the eyes: we can look at it for a long time before we discover that it never looks like itself.Fire has brought about important changes to human life, giving it much more security and comfort.However, the destructive power of fire is a real threat which not only takes many victims and results in wounded, intoxicated and homeless people but its force also wipes out and destroys places recognized as the heritage of mankind.Les hommes ont besoin du feu! Contrairement à tous les autres êtres vivants, les hommes ne pourraient pas vivre comme ils le font sans le feu; d'autre part, le fait que la plupart des feux qui brûlent sur la planète sont causés par l’homme, représente un aspect inquiétant.Pendant l’été 2007, beaucoup d’incendies ont frappé toute la zone du Nord de la Méditerranée, du Portugal à la Turquie. Hommes et feu : un binôme lié à la création du sacrifice du Titan Prométhée et qui aurait ainsi établi le modèle suivi par les hommes afin d'honorer les dieux.Le feu est vivant, comme l’eau et l'air, mais il est insaisissable au regard, c’est à dire que nous pouvons passer beaucoup de temps à le regarder mais il ne sera jamais égal à lui même. L’usage du feu a rendu la vie de l’homme plus sûre et plus confortable et il a modifié, au cours du temps, la face de la terre.Toutefois, la force déstructrice du feu représente une menace réelle qui fait des victimes, des blessés, des intoxiqu

  4. Adolescent Violent Victimization and Precocious Union Formation*

    Science.gov (United States)

    C. Kuhl, Danielle; Warner, David F.; Wilczak, Andrew

    2013-01-01

    This article bridges scholarship in criminology and family sociology by extending arguments about “precocious exits” from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization (“street” violence) on the timing of first co-residential union formation—differentiating between marriage and cohabitation—in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance. PMID:24431471

  5. Adolescent Violent Victimization and Precocious Union Formation.

    Science.gov (United States)

    C Kuhl, Danielle; Warner, David F; Wilczak, Andrew

    2012-11-01

    This article bridges scholarship in criminology and family sociology by extending arguments about "precocious exits" from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization ("street" violence) on the timing of first co-residential union formation-differentiating between marriage and cohabitation-in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance.

  6. Are fund of hedge fund returns asymmetric?

    OpenAIRE

    Lynch, Margaret; Hutson, Elaine; Stevenson, Max

    2004-01-01

    We examine the return distributions of 332 funds of hedge funds and associated indices. Over half of the sample is significantly skewed according to the skewness statistic, and these are split 50/50 positive and negative. However, we argue that the skewness statistic can lead to erroneous inferences regarding the nature of the return distribution, because the test statistic is based on the normal distribution. Using a series of tests that make minimal assumptions about the shape of the ...

  7. Fund management plan

    International Nuclear Information System (INIS)

    1984-08-01

    This revision of the Fund Management Plan updates the original plan published in May 1983. It is derived from and supplements the Mission Plan of the Office of Civilian Radioactive Waste Management. A major purpose in preparing this Plan is to inform the public about management of the Nuclear Waste Fund and the Interim Storage Fund. The purpose of the Interim Storage Fund is to finance the provision of the Federal interim storage capacity of up to 1900 metric tons of spent nuclear fuel. The Nuclear Waste Fund is a separate account for all revenues and expenditures related to the geological disposal and monitored retrieval storage of civilian radioactive waste

  8. Training for Preservation Management

    Directory of Open Access Journals (Sweden)

    Mirjam M. Foot

    1999-05-01

    Full Text Available In August 1997 the first of a series of summer schools in Preservation Management was held at the Archivschule in Marburg (Germany. The school was organised by the ECPA, the LIBER Division on Preservation, ICA and the Archivschule itself and was aimed at archivists and librarians in management positions from European institutions. It dealt with managerial, organisational and financial aspects of preservation and required active participation by those attending. Apart from introductory sessions by the teaching staff at the Archivschule, a large part of the course took the form of working groups, discussions, assignments and role play, to which participants were expected to take their own experience and problems. The school was conducted in German. Topics, spread over five days, ranged from preservation in the context of the core activities of libraries and archives; planning of preservation projects; general management issues, such as resource management, budgeting, priority setting, communication and effecting change; to more detailed considerations of day-to-day issues, such as storage, disaster control, microfilming and digitising, mass conservation processes, and moulds and fungi.

  9. Offshore Investment Funds

    Directory of Open Access Journals (Sweden)

    Shang-Jin Wei

    1999-12-01

    Full Text Available Offshore investment funds are alleged to have engaged in trading behavior that is different from their onshore counterparts because they may be subject to less supervision and regulation. In particular, they may trade more intensely. They could also pursue more aggressively certain trading strategies such as positive feedback trading or herding that could contribute to a greater volatility in the market. Using a unique data set, this chapter compares the trading behavior in the Korean stock market between offshore investment funds with their onshore counterparts registered in the US and UK. There are a number of interesting findings. First, there is indeed evidence suggesting that the offshore funds trade more intensely than their onshore counterparts. Second, however, there is no evidence that the offshore funds engage in positive feedback trading. In contrast, there is strong evidence that the funds from the U.S. and U.K. do. Third, while offshore funds do herd, they do so far less than onshore funds in the U.S. or UK. Fourth, offshore funds hold less glamour stocks (e.g. stocks with high P/E in their portfolio than funds in the U.S. or U.K. do. Moreover, flight to glamour stocks during the in-crisis period is less evident in the case of offshore funds. In sum, offshore funds are no especially worrisome monsters.

  10. Cancer and fertility preservation

    DEFF Research Database (Denmark)

    Lambertini, Matteo; Del Mastro, Lucia; Pescio, Maria C

    2016-01-01

    In the last years, thanks to the improvement in the prognosis of cancer patients, a growing attention has been given to the fertility issues. International guidelines on fertility preservation in cancer patients recommend that physicians discuss, as early as possible, with all patients...... of reproductive age their risk of infertility from the disease and/or treatment and their interest in having children after cancer, and help with informed fertility preservation decisions. As recommended by the American Society of Clinical Oncology and the European Society for Medical Oncology, sperm...... data have become available, and several issues in this field are still controversial and should be addressed by both patients and their treating physicians.In April 2015, physicians with expertise in the field of fertility preservation in cancer patients from several European countries were invited...

  11. Optimization of preservation activities and preservation engineering (2)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the viewpoint and the approach of the optimization of the ex post facto preservation and the content to be possessed in 'preservation engineering' are described. The optimization of the ex post facto preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  12. Sovereign Wealth Funds: Issue of transparency

    Directory of Open Access Journals (Sweden)

    Petrović Daliborka

    2015-01-01

    Full Text Available Subject of the paper includes Sovereign Wealth Funds and the formation of the first regulatory framework for their investment activities. Sovereign Wealth Funds invested a significant amount of money in Western financial institutions during the global financial crisis and thus played a crucial role in the preservation and stabilization of the global financial system. However, at the same time, a large gap between the financial power of Sovereign Wealth Funds and the level of their transparency was noted. The need to improve the transparency of Sovereign Wealth Funds has been recognized by international institutions, the OECD and the IMF, which initiated the formulation of the first international regulatory framework regarding the operations of these types of funds. The current international regulatory framework represents a sufficient basis for the gradual improvement of transparency, but because of its non-binding and voluntary nature, certain issues such as the protection of national security interests remain open. Therefore, the solutions can be sought through a process of continuous improvement of international regulation as well as strengthening cooperation between Sovereign Wealth Funds and governments of countries in which they invest.

  13. Data Preservation in High Energy Physics

    International Nuclear Information System (INIS)

    Mount, Richard; Brooks, Travis; Le Diberder, Francois; Dubois-Felsmann, Gregory; Neal, Homer; Bellis, Matt; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; Konigsberg, Jacobo; Roser, Robert; Snider, Rick; Lucchesi, Donatella; Denisov, Dmitri; Soldner-Rembold, Stefan; Li, Qizhong; Varnes, Erich; Jonckheere, Alan; Gasthuber, Martin; Gulzow, Volker

    2009-01-01

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group. Large data sets accumulated during many years of detector operation at particle accelerators are the heritage of experimental HEP. These data sets offer unique opportunities for future scientific studies, sometimes long after the shut-down of the actual experiments: new theoretical input; new experimental results and analysis techniques; the quest for high-sensitivity combined analyses; the necessity of cross checks. In many cases, HEP data sets are unique; they cannot and most likely will not be superseded by data from newer generations of experiments. Once lost, or in an unusable state, HEP data samples cannot be reasonably recovered. The cost of conserving this heritage through a collaborative, target-oriented long-term data preservation program would be small, compared to the costs of past experimental projects or to the efforts to re-do experiments. However, this cost is not negligible, especially for collaborations close or past their end-date. The preservation of HEP data would provide today's collaborations with a secure way to complete their data analysis and enable them to seize new scientific opportunities in the coming years. The HEP community will benefit from preserved data samples through reanalysis, combination, education and outreach. Funding agencies would receive more scientific return, and a positive image, from their initial investment leading to the production and the first analysis of preserved data.

  14. Data Preservation in High Energy Physics

    Energy Technology Data Exchange (ETDEWEB)

    Mount, Richard; Brooks, Travis; /SLAC; Le Diberder, Francois; /Orsay, LAL; Dubois-Felsmann, Gregory; Neal, Homer; /SLAC; Bellis, Matt; /Stanford U.; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; /Fermilab; Konigsberg, Jacobo; /Florida U.; Roser, Robert; Snider, Rick; /Fermilab; Lucchesi, Donatella; /INFN, Padua; Denisov, Dmitri; /Fermilab; Soldner-Rembold, Stefan; /Manchester U.; Li, Qizhong; /Fermilab; Varnes, Erich; /Arizona U.; Jonckheere, Alan; /Fermilab; Gasthuber, Martin; Gulzow, Volker; /DESY /Marseille, CPPM /Dortmund U. /DESY /Gent U. /DESY, Zeuthen /KEK, Tsukuba /CC, Villeurbanne /CERN /INFN, Bari /Gjovik Coll. Engineering /Karlsruhe, Forschungszentrum /Beijing, Inst. High Energy Phys. /Carleton U. /Cornell U. /Rutherford

    2012-04-03

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group. Large data sets accumulated during many years of detector operation at particle accelerators are the heritage of experimental HEP. These data sets offer unique opportunities for future scientific studies, sometimes long after the shut-down of the actual experiments: new theoretical input; new experimental results and analysis techniques; the quest for high-sensitivity combined analyses; the necessity of cross checks. In many cases, HEP data sets are unique; they cannot and most likely will not be superseded by data from newer generations of experiments. Once lost, or in an unusable state, HEP data samples cannot be reasonably recovered. The cost of conserving this heritage through a collaborative, target-oriented long-term data preservation program would be small, compared to the costs of past experimental projects or to the efforts to re-do experiments. However, this cost is not negligible, especially for collaborations close or past their end-date. The preservation of HEP data would provide today's collaborations with a secure way to complete their data analysis and enable them to seize new scientific opportunities in the coming years. The HEP community will benefit from preserved data samples through reanalysis, combination, education and outreach. Funding agencies would receive more scientific return, and a positive image, from their initial investment leading to the production and the first analysis of preserved data.

  15. Bystander Involvement in Peer Victimization: The Value of Looking beyond Aggressors and Victims

    Science.gov (United States)

    Wiens, Brenda A.; Dempsey, Allison

    2009-01-01

    Peer victimization has been a focus of both research and prevention program development. This construct is typically measured from the victim and aggressor perspectives. However, prevention programming often includes an additional bystander perspective. The present study evaluated whether questions regarding witnessing peer victimization…

  16. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    Directory of Open Access Journals (Sweden)

    Stevković Ljiljana

    2013-01-01

    Full Text Available Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization. Empirical analysis of the criminological consequences of early violent victimization in adulthood are an exception in scientific studies in Serbia. The aim of the paper is to present the results of research into the influence of early violent victimization on violent crime of adult men and women. After the introduction a brief overview of the worldwide research confirming the correlation between the experience of violent victimization and subsequent violent behavior is given. The results of the research conducted by the author will then be discussed. The results illustrate the possibility of predicting violent criminal behavior in adulthood based on indicators of direct and indirect victimization in childhood. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  17. Do victims only cry? Victim-survivors and their grassroots organizations in Peru

    NARCIS (Netherlands)

    de Waardt, M.F.; Ouweneel, A.

    2012-01-01

    De Waardt discusses associations of victims of the 1980s violent conflict in Peru, which she relates to the Peruvian cultural tradition of grassroots organizations. She conveys the substantial existence of victim-survivor associations, the social support its members find amongst each other, and the

  18. Advanced Digital Preservation

    CERN Document Server

    Giaretta, David

    2011-01-01

    There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages -- objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific da

  19. Victimization experiences of adolescents in Malaysia.

    Science.gov (United States)

    Choo, Wan-Yuen; Dunne, Michael P; Marret, Mary J; Fleming, Marylou; Wong, Yut-Lin

    2011-12-01

    There has been little community-based research regarding multiple-type victimization experiences of young people in Asia, and none in Malaysia. This study aimed to estimate prevalence, explore gender differences, as well as describe typical perpetrators and family and social risk factors among Malaysian adolescents. A cross-sectional survey of 1,870 students was conducted in 20 randomly selected secondary schools in Selangor state (mean age: 16 years; 58.8% female). The questionnaire included items on individual, family, and social background and different types of victimization experiences in childhood. Emotional and physical types of victimization were most common. A significant proportion of adolescents (22.1%) were exposed to more than one type, with 3% reporting all four types. Compared with females, males reported more physical, emotional, and sexual victimization. The excess of sexual victimization among boys was due to higher exposure to noncontact events, whereas prevalence of forced intercourse was equal for both genders (3.0%). Although adult male perpetrators predominate, female adults and peers of both genders also contribute substantially. Low quality of parent-child relationships and poor school and neighborhood environments had the strongest associations with victimization. Family structure (parental divorce, presence of step-parent or single parent, or household size), parental drug use, and rural/urban location were not influential in this sample. This study extends the analysis of multiple-type victimization to a Malaysian population. Although some personal, familial, and social factors correlate with those found in western nations, there are cross-cultural differences, especially with regard to the nature of sexual violence based on gender and the influence of family structure. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Compensation for oil pollution damage caused by oil spills from ships and the International Oil Pollution Compensation Fund

    International Nuclear Information System (INIS)

    Jacobsson, M.

    1994-01-01

    Liability and compensation for pollution damage caused by oil spills from laden tankers is governed by two international conventions: the 1969 Civil Liability Convention and the 1971 Fund Convention. The Civil Liability Convention established a system of strict liability for tanker owners and introduced compulsory liability insurance. The Fund Convention created a system of supplementary compensation administered by an intergovernmental organization, the International Oil Pollution Compensation Fund (IOPC Fund), which at present has 56 member states (August 1993). The IOPC Fund pays compensation to victims of oil pollution in member states when the compensation from the ship owner and his insurer is insufficient. (author)

  1. Psychosocial profile of bullies, victims, and bully-victims: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Marie eLeiner

    2014-01-01

    Full Text Available While adverse conditions in a child’s life do not excuse inappropriate behavior, they may cause emotional and behavioral problems that require treatment as a preventive measure to reduce the likelihood of bullying. We aimed to identify differences in the psychosocial profiles of adolescents who classified themselves as bullies, victims, or bully-victims. We performed a cross-sectional study in which data were collected between January 2009 and January 2010 from seven university-based clinics in a large metropolitan area with a predominantly Mexican-American population. We collected data on physical aggression among adolescents who self-categorized into the following groups: uninvolved, bullies, victims, and bully-victims. We determined the psychosocial profiles of the adolescents based on responses to the Youth Self Report (YSR and parent’s responses to the Child Behavior Checklist (CBCL. A one-way analysis of variance and multivariate regression analyses were performed to compare the various components of the psychosocial profiles among the groups. Our analysis of the CBCL and the YSR assessments identified differences between the uninvolved group and one or more of the other groups. No significant differences were observed among the bully, victim, and bully-victim groups based on the CBCL. We did find significant differences among those groups based on the YSR, however. Our results suggest that emotional and behavioral problems exist among bullies, victims, and bully-victims. Therefore, treatment should not focus only on the victims of bullying; treatment is equally important for the other groups (bullies and bully-victims. Failure to adequately treat the underlying problems experienced by all three groups of individuals could allow the problems of bullying to continue.

  2. Integral-preserving integrators

    International Nuclear Information System (INIS)

    McLaren, D I; Quispel, G R W

    2004-01-01

    Ordinary differential equations having a first integral may be solved numerically using one of several methods, with the integral preserved to machine accuracy. One such method is the discrete gradient method. It is shown here that the order of the method can be bootstrapped repeatedly to higher orders of accuracy. The method is illustrated using the Henon-Heiles system. (letter to the editor)

  3. Foodstuffs preservation by ionization

    International Nuclear Information System (INIS)

    1991-12-01

    This document contains all the papers presented at the meeting on foodstuffs preservation by ionization. These papers deal especially with the food ionization process, its development and the view of the food industry on ionization. Refs and figs (F.M.)

  4. Preserving food with radiation

    International Nuclear Information System (INIS)

    Thomas, A.C

    1978-01-01

    Food irradiation is becoming an increasingly more important method of food preservataion. The irradiation process and its advangages are briefly described, and its use in the preservation of poultry and various kinds of fruits is discussed. Fruit export is hampered by restrictions due to infestation. Radiation disinfestation will therefore be of great advantage and may lead to a growth in export markets

  5. Preserve America News

    Science.gov (United States)

    phone number. Whether or not you're able to let us know ahead of time, however, we hope you can join us Amache Preservation Society in Colorado and the Friends of Mount Hope Cemetery in New York. This brings Places: Breathing New Life into Our Communities." Read about this informative session. National

  6. POLARISATION PRESERVING OPTICAL FIBRE

    DEFF Research Database (Denmark)

    2000-01-01

    . This cladding structure provides polarisation preserving properties to the optical fibre. Optical fibres using this technology may have claddings with elements placed non-periodically as well as in a two-dimensional periodic lattice - such as cladding providing Photonic Band Gap (PBG) effects....

  7. Wood preservative testing

    Science.gov (United States)

    Rebecca Ibach; Stan T. Lebow

    2012-01-01

    Most wood species used in commercial and residential construction have little natural biological durability and will suffer from biodeterioration when exposed to moisture. Historically, this problem has been overcome by treating wood for outdoor use with toxic wood preservatives. As societal acceptance of chemical use changes, there is continual pressure to develop and...

  8. Preservation in New Buildings

    Directory of Open Access Journals (Sweden)

    Christopher Kitching

    2000-06-01

    Full Text Available In the United Kingdom (as in many other countries increasing attention is being paid to the importance of each library and archive having a written preservation strategy endorsed by its governing body. So increasingly we are asking: where does „preservation“ begin and what are its top priorities? Some would say preservation begins with the definition of collecting policies to ensure that only relevant items are acquired in the first place, and therefore that no unnecessary costs are incurred on the long-term care of unwanted and unconsulted items. Others might argue that the first priority must be the careful appraisal of existing holdings to determine their preservation and conservation requirements and to prioritise their treatment. Or should preservation begin with damage-limitation: restricting the physical handling of books and documents, on the one hand by providing whenever possible surrogate copies in digital formats or microform, and on the other hand by offering at least basic protection through appropriate boxing and packaging? This, surely, goes hand-in-hand with the education of staff and readers about the importance of treating rare or unique materials with proper respect.

  9. Preserving the Seminar Experience

    Science.gov (United States)

    Ramsey, David; Evans, Jocelyn; Levy, Meyer

    2016-01-01

    This article presents a new approach to online graduate education. With hopes of recruiting a larger cohort in order to preserve a graduate program struggling with low enrollment, we began offering a limited number of seats to students who would attend class in real time but from remote locations, using a videoconferencing platform. Unlike…

  10. A Fund of Wisdom

    DEFF Research Database (Denmark)

    Seabrooke, Leonard; Broome, André

    2006-01-01

    The International Monetary Fund spends most of its time monitoring its member states' economic performance and advising on institutional change. While much of the literature sees the Fund as a policy enforcer in "emerging market" and "frontier" economies, little attention has been paid to exploring...... for change on the basis of like-characteristics among economies. Many Western states, particularly small open economies, consider the Fund's advice as important not only for technical know-how, but because Fund assessments are significant to international and domestic political audiences. This article traces...... the Fund's advice on taxation and monetary reform to two coordinated market economies, Denmark and Sweden, and two liberal market economies, Australia and New Zealand from 1975 to 2004. It maps how the Fund advocated "policy revolutions" and "policy recombinations" during this period, advice that coincided...

  11. CERN Pension Fund move

    CERN Multimedia

    HR Department

    2007-01-01

    The CERN Pension Fund has moved to new offices on the 5th floor of Building 5. The Benefits Service of the Fund is now located in Offices 5-5-017 - 5-5-021 - 5-5-023. We remind you that the office hours are: Tuesday/Wednesday/Thursday from 10 am to 12 am and from 3 pm to 5 pm. The Fund would like to take this opportunity to warmly thank all the persons involved in the relocation.

  12. Regulating hedge funds.

    OpenAIRE

    Daníelsson, J.; Zigrand, JP.

    2007-01-01

    Due to the ever-increasing amounts under management and their unregulated and opaque nature, hedge funds have emerged as a key concern for policymakers. While until now, hedge funds have been left essentially unregulated, we are seeing increasing calls for regulation for both microprudential and macroprudential reasons. In our view, most calls for the regulation of hedge funds are based on a misperception of the effectiveness of financial regulations, perhaps coupled with a lack of understand...

  13. DNA preservation in silk.

    Science.gov (United States)

    Liu, Yawen; Zheng, Zhaozhu; Gong, He; Liu, Meng; Guo, Shaozhe; Li, Gang; Wang, Xiaoqin; Kaplan, David L

    2017-06-27

    The structure of DNA is susceptible to alterations at high temperature and on changing pH, irradiation and exposure to DNase. Options to protect and preserve DNA during storage are important for applications in genetic diagnosis, identity authentication, drug development and bioresearch. In the present study, the stability of total DNA purified from human dermal fibroblast cells, as well as that of plasmid DNA, was studied in silk protein materials. The DNA/silk mixtures were stabilized on filter paper (silk/DNA + filter) or filter paper pre-coated with silk and treated with methanol (silk/DNA + PT-filter) as a route to practical utility. After air-drying and water extraction, 50-70% of the DNA and silk could be retrieved and showed a single band on electrophoretic gels. 6% silk/DNA + PT-filter samples provided improved stability in comparison with 3% silk/DNA + filter samples and DNA + filter samples for DNA preservation, with ∼40% of the band intensity remaining at 37 °C after 40 days and ∼10% after exposure to UV light for 10 hours. Quantitative analysis using the PicoGreen assay confirmed the results. The use of Tris/borate/EDTA (TBE) buffer enhanced the preservation and/or extraction of the DNA. The DNA extracted after storage maintained integrity and function based on serving as a functional template for PCR amplification of the gene for zinc finger protein 750 (ZNF750) and for transgene expression of red fluorescence protein (dsRed) in HEK293 cells. The high molecular weight and high content of a crystalline beta-sheet structure formed on the coated surfaces likely accounted for the preservation effects observed for the silk/DNA + PT-filter samples. Although similar preservation effects were also obtained for lyophilized silk/DNA samples, the rapid and simple processing available with the silk-DNA-filter membrane system makes it appealing for future applications.

  14. INDEXING AND INDEX FUNDS

    Directory of Open Access Journals (Sweden)

    HAKAN SARITAŞ

    2013-06-01

    Full Text Available Proponents of the efficient market hypothesis believe that active portfolio management is largely wasted effort and unlikely to justify the expenses incurred. Therefore, they advocate a passive investment strategy that makes no attempt to outsmart the market. One common strategy for passive management is indexing where a fund is designed to replicate the performance of a broad-based index of stocks and bonds. Traditionally, indexing was used by institutional investors, but today, the use of index funds proliferated among individual investors. Over the years, both international and domestic index funds have disproportionately outperformed the market more than the actively managed funds have.

  15. How to become a victim of crime

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-03-01

    Full Text Available Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1 the emergence of criminal threats; 2 increasing the degree of social vulnerability to criminal assault; 3 the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations; 4 increase the number of victims of crimes as registered and latent, which helps re-victimization of some of them. As a result of our Internet survey of more than 3002 people (2015 defined the proportion of citizens who every year are victims of crime. By 2015 it is 37 %. However, one in seven respondents already had experience of victimization before. In our view, there is a threshold of permissible viktymizovanosti population not exceeding 40 % and is independent of the level of crime in a calendar year or an. Typically, victims of crime every year are new faces. Re-victimization experiences 15 % of citizens. The risk of becoming a victim of crime depends on the accuracy and timeliness of recognition of sources and types of criminal threats. Showed a rather stereotypical ideas of the criminal threat and showed a disorientation in identifying their sources. The last mentioned some time. Traditionally people cautious attitude to strangers, suspicious issued and may bear criminal intent (62 %; alarming stay at poorly attended locations in the dark (67 % and likelihood of falling into unpredictable situations (44 %. Only 15% of respondents sees the source of victimization in their own dangerous behavior. While the public understanding of the sources of victimization are largely abstract and false character. So, to our knowledge, most people are afraid of violent crime (64 %, but actually experiencing mercenary crimes (60 %. In the context of what has been said quite expected the place called criminal

  16. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    INTRODUCTION: From the clinical forensic examination reports produced by the Department of Forensic Medicine, Department of Forensic Medicine, Faculty of Health Sciences, University of Copenhagen, Denmark, in 2007 concerning rape, attempted rape and sexual assault (RAS), circumstances were...... extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  17. Pupils as Victims of Peer Violence

    Directory of Open Access Journals (Sweden)

    Cvek Mihaela

    2013-11-01

    Full Text Available The school is an educational institution that has to provide appropriate control of adults over pupils, which they do. Nevertheless, violence cannot be avoided. Pupils encounter peer violence in different roles, as observers, victims, perpetrators, or both. The objective of our research was to examine how often pupils are victims of peer violence, and to what extent the latter depends on pupils’ gender and age. The results of the research made among pupils in the fifth, seventh, and eighth grades of various primary schools across Slovenia showed that 24.1 per cent of pupils had already been victims of peer violence. The ones that they tend to tell about such episodes are their parents. The results have also shown that school is really a place where violence is very common, and that psychological and verbal abuse are the most common types of violence used.

  18. Support for victims of crime: Analysis of the VDS info and victim support service in 2010

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2011-01-01

    Full Text Available VDS info and victim support service is a victim support service, which was established in 2003 within the Victimology Society of Serbia. The service provides emotional support, information and, if necessary, referral to other relevant services, as well as witness support. The target group of the service are direct and indirect victims of all forms of crime, of both sexes, regardless of any personal characteristics. In addition, support is provided to victims in court, as well as to women victims of violence who are in prison. In most cases victim support is provided by volunteers who are trained to work with victims of crime. This paper analyzes the work of the service in 2010. Special attention is paid to the problems of workplace violence and domestic violence, which are the most common reasons for contacting the service. The aim of the paper is to present the work of the service in the past year, as well as to highlight the trends observed in comparison to the previous period.

  19. Peer Victimization and Dating Violence Victimization: The Mediating Role of Loneliness, Depressed Mood, and Life Satisfaction.

    Science.gov (United States)

    Cava, María-Jesús; Buelga, Sofía; Tomás, Inés

    2018-03-01

    Peer victimization and dating violence victimization have serious negative effects on adolescents' health, and they seem to be related. However, the mediating processes in this relationship have not been sufficiently analyzed. The purpose of this study was to analyze the direct and indirect relationships between peer victimization and dating violence victimization, considering the possible mediator role of loneliness, depressed mood, and life satisfaction. These relationships are analyzed in boys and girls, and in early and middle adolescence. From an initial sample of 1,038 Spanish adolescents, those who had or had had in the past 12 months a dating relationship (647 adolescents; 49.1% boys, M = 14.38, SD = 1.43) were included in this study. Multigroup structural equation modeling was used to test a double mediation model simultaneously for boys and girls, testing the invariance of the relationships among variables across genders. The same technique was used to test the model simultaneously for early and middle adolescence, testing the invariance of the relationships among variables across age groups. Results revealed a positive direct relationship between peer victimization and dating violence victimization, as well as the partial mediating role of loneliness and life satisfaction in this relationship. The mediator role of depressed mood was not supported. The same mediational model was confirmed in boys and girls, and in early and middle adolescence. These results highlight the important role of loneliness and life satisfaction to explain the link between peer victimization and dating violence victimization in adolescence. These findings may be useful for developing intervention programs aimed at preventing situations of multiple victimization during adolescence.

  20. Bullying and victimization in elementary schools : A comparison of bullies, victims, bully/victims, and uninvolved preadolescents

    NARCIS (Netherlands)

    Veenstra, René; Lindenberg, Siegwart; Oldehinkel, Albertine J.; Winter, Andrea F. de; Verhulst, Frank C.; Ormel, Johan

    Research on bullying and victimization largely rests on univariate analyses and on reports from a single informant. Researchers may thus know too little about the simultaneous effects of various independent and dependent variables, and their research may be biased by shared method variance. The

  1. NREL Funding Reductions

    Science.gov (United States)

    Energy Laboratory (NREL) announced today that it will further reduce its work force as a result of million. Recent indications, however, are that NREL's funding will be lowered by an additional $27 million employees. NREL Director Charles F. Gay said the additional funding cuts are a result of lower than expected

  2. The Phony Funding Crisis

    Science.gov (United States)

    Guthrie, James W.; Peng, Arthur

    2010-01-01

    If one relies on newspaper headlines for education funding information, one might conclude that America's schools suffer from a perpetual fiscal crisis, every year perched precariously on the brink of financial ruin, never knowing whether there will be sufficient funding to continue operating. Budgetary shortfalls, school district bankruptcies,…

  3. Fund management plan

    International Nuclear Information System (INIS)

    1983-05-01

    The Nuclear Waste Policy Act of 1982, P.L. 97-425 (the Act), provides for establishment of two separate special funds in the US Treasury, the Interim Storage Fund and the Nuclear Waste Fund (the Funds). The Interim Storage Fund (Sec. 136) is the financing mechanism for the provision of federal interim storage capacity, not to exceed 1900 metric tons, for spent nuclear fuel (SNF) from civilian reactors. Basically, interim storage of SNF is the responsibility of the owners and generators of nuclear wastes. Storage at government facilities will be provided only if the utilities do not have adequate storage capacity. The Nuclear Waste Fund (Sec. 302) is the statutory financing approach for the Department's radioactive waste disposal program. P.L. 97-425 directs utilities to pay a mandatory fee to cover DOE's expected costs for nuclear waste disposal. The Funds are administered by the Department of Energy. This Plan identifies how DOE will implement and manage the Nuclear Waste and Interim Storage Funds

  4. Educational Technology Funding Models

    Science.gov (United States)

    Mark, Amy E.

    2008-01-01

    Library and cross-disciplinary literature all stress the increasing importance of instructional technology in higher education. However, there is a dearth of articles detailing funding for library instructional technology. The bulk of library literature on funding for these projects focuses on one-time grant opportunities and on the architecture…

  5. Activity Fund Accounting.

    Science.gov (United States)

    Cool, David W.

    1983-01-01

    Addresses the need of school districts in many states to decide on an appropriate mingling of centralization and decentralization in the operation of activity funds. Argues for analysis of activity fund operation through a breakdown into such major components as policy, the accounting system, and reporting and auditing. (JBM)

  6. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Oztasiran, I.

    1984-01-01

    Irradiation is a physical process for treating food and as such it is comparable to other processing techniques such as heating or freezing foods for preservation. The energy level used in food irradiation is always below that producing radioactivity in the treated food, hence this aspect can be totally excluded in wholesomeness evaluations. Water is readily ionized and may be the primary source of ionization in foods with secondary effects on other molecules, possibly more a result of water ionization than of direct hits. In the presence of oxygen, highly reactive compounds may be produced, such as H, H 3 0+ and H 2 O 2 . Radiation at the energy flux levels used for food (<2 MeV) does not induce radioactivity. Food irradiation applications are already technically and economically feasible and that food so treated is suitable for consumption. Food irradiation techniques can play an important role for an improved preservation, storage and distribution of food products. (author)

  7. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Kooij, J. van

    1981-01-01

    Twenty-five years of development work on the preservation of food by irradiation have shown that this technology has the potential to reduce post-harvest losses and to produce safe foods. The technological feasibility has been established but general acceptance of food irradiation by national regulatory bodies and consumers requires attention. The positive aspects of food preservation by irradiation include: the food keeps its freshness and its physical state, agents which cause spoilage (bacteria, etc.) are eliminated, recontamination does not take place, provided packaging materials are impermeable to bacteria and insects. It inhibits sprouting of root crops, kills insects and parasites, inactivates bacteria, spores and moulds, delays ripening of fruit, improves the technological properties of food. It makes foods biologically safe, allows the production of shelf-stable foods and is excellent for quarantine treatment, and generally improves food hygiene. The dose ranges needed for effective treatment are given

  8. How to preserve foods

    International Nuclear Information System (INIS)

    Balek, V.; Vadassova, J.

    1979-01-01

    The use of gamma and fast electron radiations for food preservation is described. Examples are given of the application of ionizing radiation for retarding potato germination, onion growth, and fruit ripening, for limiting the action of microorganisms, and removing salmonella from meat products. The method has remarkable prospects although it may not be considered to be a general-purpose method. Geographic and economic conditions should always be taken into consideration. (J.P.)

  9. Preservation and gamma irradiation

    International Nuclear Information System (INIS)

    Ramiere, R.

    1991-01-01

    The paper reviews briefly the application of gamma radiation to preservation of cultural objects for disinsectization, disinfection and strengthening of materials such as wood or stone by impregnation with a liquid resin and in situ polymerization. As heavy equipment is required two facilities are specialized a 1000 T Bq cobalt 60 source at Grenoble (France) and 100 T Bq one at Rostoky (Czechoslovakia). Examples of treated objects are given [fr

  10. Beneficial bread without preservatives

    OpenAIRE

    Denkova, Zapryana; Denkova, Rositsa

    2014-01-01

    Besides their inherent nutritional value functional foods contain substances that have beneficial impact on the functioning of organs and systems in the human body and reduce the risk of disease. Bread and bakery goods are basic foods in the diet of contemporary people. Preservatives are added to the composition of foods in order to ensure their microbiological safety, but these substances affect directly the balance of microflora in the tract. A great problem is mold and bacterial spoilage (...

  11. Nuclear Waste Fund management

    International Nuclear Information System (INIS)

    Rosselli, R.

    1984-01-01

    The Nuclear Waste Policy Act of 1982 (NWPA) established two separate special bank accounts: the Nuclear Waste Fund (NWF) was established to finance all of the Federal Government activities associated with the disposal of High-Level Waste (HLW) or Spent Nuclear Fuel (SNF). The Interim Storage Fund (ISF) is the financial mechanism for the provision of Federal Interim Storage capacity, not to exceed 1900 metric tons of SNF at civilian power reactors. The management of these funds is discussed. Since the two funds are identical in features and the ISF has not yet been activated, the author's remarks are confined to the Nuclear Waste Fund. Three points discussed include legislative features, current status, and planned activities

  12. Fertility preservation 2

    Science.gov (United States)

    De Vos, Michel; Smitz, Johan; Woodruff, Teresa K

    2014-01-01

    Enhanced long-term survival rates of young women with cancer and advances in reproductive medicine and cryobiology have culminated in an increased interest in fertility preservation methods in girls and young women with cancer. Present data suggest that young patients with cancer should be referred for fertility preservation counselling quickly to help with their coping process. Although the clinical application of novel developments, including oocyte vitrification and oocyte maturation in vitro, has resulted in reasonable success rates in assisted reproduction programmes, experience with these techniques in the setting of fertility preservation is in its infancy. It is hoped that these and other approaches, some of which are still regarded as experimental (eg, ovarian tissue cryopreservation, pharmacological protection against gonadotoxic agents, in-vitro follicle growth, and follicle transplantation) will be optimised and become established within the next decade. Unravelling the complex mechanisms of activation and suppression of follicle growth will not only expand the care of thousands of women diagnosed with cancer, but also inform the care of millions of women confronted with reduced reproductive fitness because of ageing. PMID:25283571

  13. Grain preservation in SSSR

    International Nuclear Information System (INIS)

    Trisviatski, L.A.

    1973-01-01

    First the importance of cereals collected in the S.S.S.R., the reason why the government had to put in practice a storage chain, composed of large capacity store houses (200 000 metric tonnes, or more) is reminded. When climatic conditions result in wet harvested grains, cereals are dried either in state enterprise dryers (32 to 50 tonnes/hour) or in kolkhozes' dryers (2 to 16 tonnes/hour). A new type of drying with recycling, has been developped, economizing 10 to 15 p. 100. Then the possibilities offered by the technique of partial drying of very wet grains are studied and the preservation processes using fresh ventilation, or hot ventilation with drying effect are described. The question of silage of wet grains destined to animal consumption is then examined as well as preservation by sodium pyrosulfide; the use of propionic acid, little developped in SSSR, is studied now, just as storage with inert gas. The struggle technics against insects, either with chemical agents, or with irradiation are described. Finally the modalities of technicians formation, specialized in preservation, are discussed [fr

  14. A latent class analysis of bullies, victims and aggressive victims in Chinese adolescence: relations with social and school adjustments.

    Directory of Open Access Journals (Sweden)

    Aihui Shao

    Full Text Available This study used the latent class analysis (LCA to identify and classify Chinese adolescent children's aggressive behaviors. It was found that (1 Adolescent children could be divided into four categories: general children, aggressive children, victimized children and aggressive victimized children. (2 There were significant gender differences among the aggressive victimized children, the aggressive children and the general children. Specifically, aggressive victimized children and aggressive children had greater probabilities of being boys; victimized children had equal probabilities of being boys or girls. (3 Significant differences in loneliness, depression, anxiety and academic achievement existed among the aggressive victims, the aggressor, the victims and the general children, in which the aggressive victims scored the worst in all questionnaires. (4 As protective factors, peer and teacher supports had important influences on children's aggressive and victimized behaviors. Relative to general children, aggressive victims, aggressive children and victimized children had lower probabilities of receiving peer supports. On the other hand, compared to general children, aggressive victims had lower probabilities of receiving teacher supports; while significant differences in the probability of receiving teacher supports did not exist between aggressive children and victimized children.

  15. An Analysis of the Mutual Fund Industry: Mutual Fund Investors, Mutual Fund Managers and Mutual Fund Companies

    OpenAIRE

    Fang, Jieyan

    2012-01-01

    In this dissertation I investigate the mutual fund industry, especially the three most important participants within this industry: mutual fund investors, mutual fund companies and mutual fund managers. The main research questions of this dissertation are: 1. Does rapid trading exist among German equity mutual fund investors? What are the determinants of rapid trading? Does rapid trading have a negative impact on mutual fund performance? 2. Do mutual fund investors, as a whole, have...

  16. Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization

    OpenAIRE

    Erdinc Ozturk; Gizem Akcan

    2016-01-01

    Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...

  17. The Victim Handling Model of Human Trafficking Through Economic Independence

    OpenAIRE

    Nuraeny, Henny; Utami, Tanti Kirana

    2016-01-01

    Human Trafficking is a modern trading of human slavery. Human Trafficking is also one of the worst forms of violation of human dignity that results in trauma to the victims. To that end, there should be a comprehensive treatment for victims. The problems that can be studied is whether a model that can be applied in the treatment of victims of trafficking in Cianjur and disseminating technical how models Handling of Victims of Human Trafficking in Cianjur. This study used normative juridical a...

  18. Training development for pavement preservation.

    Science.gov (United States)

    2013-05-01

    This research project strives to help the Iowa Department of Transportation (DOT) fully achieve the full benefits of pavement : preservation through training on proper selection, design, and application of pavement preservation treatments. In some ca...

  19. ACHP | Tribal Historic Preservation Officers

    Science.gov (United States)

    preservation of significant historic properties. Those functions include identifying and maintaining Working with Section 106 Federal, State, & Tribal Programs Training & Education Publications Search skip specific nav links Home arrow Historic Preservation Programs & Officers arrow THPOs

  20. Racial and Ethnic Stereotypes and Bullying Victimization

    Science.gov (United States)

    Peguero, Anthony A.; Williams, Lisa M.

    2013-01-01

    Bullying is a serious problem within the U.S. school system. Prior research suggests that victimization is stratified by race and ethnicity. However, few studies consider factors that may moderate this relationship. This article extends research on this topic by considering whether stereotypes moderate bullying among racial and ethnic youth. Youth…

  1. Teenagers as Victims in the Press

    Science.gov (United States)

    Andersson, Gunvor; Lundstrom, Tommy

    2007-01-01

    Research into press reporting on young people has tended to concentrate on young people as offenders. In contrast, this article focuses on press coverage of teenagers as victims. Reports in two Swedish newspapers (a morning broadsheet and an evening tabloid) were studied over a period of four months and subjected to a qualitative analysis of…

  2. Psychological distress among adolescents victims of cyberbullying

    Directory of Open Access Journals (Sweden)

    Jessica Ortega-Barón

    2017-07-01

    Full Text Available The information and communication technologies have rapidly been incorporated and expanded in our society. The age in which children and adolescents get access to electronic devices is decreasing. These devices have big advantages, but they can also be inappropriately used to molest and intimidate other children and, as a result, to cause severe psychological problems to other children. Taking this into consideration, the main objective of this study has been to describe the psychological distress shown by adolescents suffering from cyberbullying. In order to do this, the following variables were registered: depressive symptomatology, perceived stressed, isolation and life satisfaction. The initial sample was formed by 1360 adolescents. From these, 194 from 11 to 18 years old (M = 14.22, SD = 1.81 were selected according to their scores in cybervictimization (43.8 % boys. Participants were divided into three groups according to how intense their cyberbullying victimization was. These were: mild, moderated and severe. Our findings show that there were statistically significant differences between mild and severe victims. Adolescents who were severe cyberbullying victims scored higher in depressive symptomatology and perceived stress, and lower in life satisfaction compared to mild cyberbullying victims. These results and their implications are discussed in order to propose future strategies to prevent cyberbullying.

  3. Simulating Peer Support for Victims of Cyberbullying

    NARCIS (Netherlands)

    Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.

    2010-01-01

    This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future

  4. Treating the Adolescent Victim-Turned-Offender.

    Science.gov (United States)

    Muster, Nori J.

    1992-01-01

    Many juvenile sex offenders are also victims of sexual abuse. Treatment primarily focuses on juvenile's criminal acts in confrontational, nonsympathetic manner. Surveyed 18 professionals in sexual abuse treatment field to assess attitudes toward juvenile sex offender treatment. Those in corrections field were greatest supporters of confrontational…

  5. The Perception of Cyberbullying in Adolescent Victims

    Science.gov (United States)

    Sevcikova, Anna; Smahel, David; Otavova, Mlada

    2012-01-01

    The goal of this study was to explore how victims of cyberbullying perceive online aggressive attacks and when they see them as harmful. Interviews were carried out with 16 cybervictimised participants aged 15-17 years. The findings showed differences in the perception of online victimisation when perpetrated by an anonymous Internet user versus…

  6. Always the victim : Israel's present wars

    NARCIS (Netherlands)

    Reinhart, T.

    2006-01-01

    In the Israeli discourse, Israel has always been the innocent victim of vicious aggression from its neighbors. This perception of reality has only intensified with its two recent wars - against the Palestinians in Gaza and against Lebanon. On this view, in both cases Israel has manifested its good

  7. The Other Victims of the Nazis.

    Science.gov (United States)

    Friedman, Ina R.

    1995-01-01

    Maintains that, 50 years after World War II, few people are aware that Jews were not the only Nazi victims. Describes Nazi persecution against Gypsies, homosexuals, blacks, political dissenters, and other groups. Contends that every new generation of students should learn about the devastating effects of prejudice. (CFR)

  8. Internet piracy and consequences for victims

    Directory of Open Access Journals (Sweden)

    Savić Miljan

    2016-01-01

    Full Text Available After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total social cost of piracy. However, there are other categories of victims, such as those whose honor was besmirched as a result of piracy, and who suffer the consequences in the form of negative emotional reactions, loss of job as well as those who subsequently commit suicide. The object of this paper is to describe the effects of internet piracy on the victims of this phenomenon, and the goal is the analysis of the various direct and indirect effects of piracy on victims and their motivation for future creation, as well as analysis of prevention measures, with special emphasis on the Republic of Serbia.

  9. Global Human Trafficking and Child Victimization.

    Science.gov (United States)

    Greenbaum, Jordan; Bodrick, Nia

    2017-12-01

    Trafficking of children for labor and sexual exploitation violates basic human rights and constitutes a major global public health problem. Pediatricians and other health care professionals may encounter victims who present with infections, injuries, posttraumatic stress disorder, suicidality, or a variety of other physical or behavioral health conditions. Preventing child trafficking, recognizing victimization, and intervening appropriately require a public health approach that incorporates rigorous research on the risk factors, health impact, and effective treatment options for child exploitation as well as implementation and evaluation of primary prevention programs. Health care professionals need training to recognize possible signs of exploitation and to intervene appropriately. They need to adopt a multidisciplinary, outward-focused approach to service provision, working with nonmedical professionals in the community to assist victims. Pediatricians also need to advocate for legislation and policies that promote child rights and victim services as well as those that address the social determinants of health, which influence the vulnerability to human trafficking. This policy statement outlines major issues regarding public policy, medical education, research, and collaboration in the area of child labor and sex trafficking and provides recommendations for future work. Copyright © 2017 by the American Academy of Pediatrics.

  10. The Adolescent Victim of Crime and Delinquency.

    Science.gov (United States)

    Flowers, R. Barri

    Child maltreatment and juvenile delinquency have both been widely studied. While statistics on the number of cases of abuse or delinquency are quite high, they are considered conservative, and estimates of actual as opposed to reported cases are much higher. There are striking parallels between adolescent victimization and adolescent antisocial…

  11. Race, Ethnicity, and Adolescent Violent Victimization.

    Science.gov (United States)

    Tillyer, Marie Skubak; Tillyer, Rob

    2016-07-01

    The risk of adolescent violent victimization in the United States varies considerably across racial and ethnic populations; it is unknown whether the sources of risk also vary by race and ethnicity. This study examined the correlates of violent victimization for White, Black, and Hispanic youth. Data collected from 11,070 adolescents (51 % female, mean age = 15.04 years) during the first two waves of the National Longitudinal Study of Adolescent to Adult Health were used to estimate group-specific multilevel logistic regression models. The results indicate that male, violent offending, peer deviance, gang membership, and low self-control were significantly associated with increased odds of violent victimization for all groups. Some activities-including getting drunk, sneaking out, and unstructured socializing with peers-were risk factors for Black adolescents only; skipping school was a risk factor only for Hispanic adolescents. Although there are many similarities across groups, the findings suggest that minority adolescents are particularly vulnerable to violent victimization when they engage in some activities and minor forms of delinquency.

  12. Violence Exposure and Victimization among Rural Adolescents

    Science.gov (United States)

    Mykota, David B.; Laye, Adele

    2015-01-01

    Violence exposure is a serious public health concern for adolescents in schools today. Violence exposure can be quite severe and frequent with multiple acts of indirect and direct victimization having lasting effects on the physical, emotional, and intellectual well-being of adolescents. The purpose of the present study is to examine the rates of…

  13. [Minor Victims of Violent Acts in the Context of the Victim Reparation Law].

    Science.gov (United States)

    Hellwig, Katharina; Kröger, Christoph; Franke, Stefanie; Wehrmeyer, Matthias; Heinrichs, Nina

    2018-03-01

    A descriptive analysis of victim compensation applications for children and adolescents as well as sociodemographic and trauma-specific information concerning victims and perpetrators. We did analysis of 100 victim-compensation application files based on a self-developed category system. The files included solely interpersonal trauma, 59 % of which are type II trauma. The most frequent form is sexual violence. The perpetrators stem mostly from children’s homes or peripherals. 79 % of the victims received a diagnosis of a mental disorder, most often posttraumatic stress disorder. Sexually abused children and adolescents make up the majority of the target population in OEG-related trauma outpatient units. Such outpatient units should therefore offer a specific expertise in treating sexually abused children and adolescents.

  14. Victim derogation and victim enhancement as alternate routes to system justification.

    Science.gov (United States)

    Kay, Aaron C; Jost, John T; Young, Sean

    2005-03-01

    Abstract-Numerous studies have documented the potential for victim-blaming attributions to justify the status quo. Recent work suggests that complementary, victim-enhancing stereotypes may also increase support for existing social arrangements. We seek to reconcile these seemingly contradictory findings by proposing that victim derogation and victim enhancement are alternate routes to system justification, with the preferred route depending on the perception of a causal link between trait and outcome. Derogating "losers" (and lionizing "winners") on traits (e.g., intelligence) that are causally related to outcomes (e.g., wealth vs. poverty) serves to increase system justification, as does compensating "losers" (and downgrading "winners") on traits (e.g., physical attractiveness) that are causally unrelated to those outcomes. We provide converging evidence using system-threat and stereotype-activation paradigms.

  15. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  16. Social Information Processing Mechanisms and Victimization: A Literature Review.

    Science.gov (United States)

    van Reemst, Lisa; Fischer, Tamar F C; Zwirs, Barbara W C

    2016-01-01

    The aim of the current literature review, which is based on 64 empirical studies, was to assess to what extent mechanisms of the Social Information Processing (SIP) model of Crick and Dodge (1994) are related to victimization. The reviewed studies have provided support for the relation between victimization and several social information processing mechanisms, especially the interpretation of cues and self-efficacy (as part of the response decision). The relationship between victimization and other mechanisms, such as the response generation, was only studied in a few articles. Until now research has often focused on just one step of the model, instead of attempting to measure the associations between multiple mechanisms and victimization in multivariate analyses. Such analyses would be interesting to gain more insight into the SIP model and its relationship with victimization. The few available longitudinal studies show that mechanisms both predict victimization (internal locus of control, negative self-evaluations and less assertive response selection) and are predicted by victimization (hostile attribution of intent and negative evaluations of others). Associations between victimization and SIP mechanisms vary across different types and severity of victimization (stronger in personal and severe victimization), and different populations (stronger among young victims). Practice could focus on these stronger associations and the interpretation of cues. More research is needed however, to investigate whether intervention programs that address SIP mechanisms are suitable for victimization and all relevant populations. © The Author(s) 2014.

  17. Relations among School Connectedness, Hope, Life Satisfaction, and Bully Victimization

    Science.gov (United States)

    You, Sukkyung; Furlong, Michael J.; Felix, Erika; Sharkey, Jill D.; Tanigawa, Diane; Green, Jennifer Greif

    2008-01-01

    This study investigates the role of school connectedness in mediating the relation between students' sense of hope and life satisfaction for three groups: Bullied Victims, Peer Victims, and Nonvictims. Students in grades 5 to 12 (N = 866) completed the California Bully/Victim Scale, School Connectedness Scale, Children's Hope Scale, and Students'…

  18. Secrecy and persistent problems in sexual assault victims.

    NARCIS (Netherlands)

    Ensink, B.J.; Winkel, F.W.; Berlo, van W.

    2001-01-01

    A substantial number of victims of sexual assault refrain from disclosing to others the victimizing episode and its emotional consequences. A prospective study (n = 36 rape victims reporting theirvictimization to the police) and a retrospective study (n = 33) were conducted to examine the

  19. Do Social Relationships Protect Victimized Children against Internalizing Problems?

    Science.gov (United States)

    Averdijk, Margit; Eisner, Manuel; Ribeaud, Denis

    2014-01-01

    We investigated whether social relationships protect children against the effects of victimization on internalizing problems. We used data from the Zurich Project on the Social Development of Children and Youths. Victimization at age 8 years was associated with internalizing problems at age 9 years. Victims who had siblings, warm parents, and a…

  20. Ultrametricity in Fund of Funds Diversification

    OpenAIRE

    Susinno, Gabriele; Miceli, Maria Augusta

    2003-01-01

    Minimum market transparency requirements impose Hedge Fund (HF) managers to use the statement declared strategy in practice. However each declared strategy may actually origin a multiplicity of implemented management decisions. Is then the "actual "strategy the same as the "announced" strategy? Can the actual strategy be monitored or compared to the actual strategy of HF belonging to the same "announced" class? Can the announced or actual strategy be used as a quantitative argument in the fun...

  1. INVESTMENT FUNDS IN ROMANIA

    Directory of Open Access Journals (Sweden)

    COPIL CRINA ANGELA

    2013-07-01

    Full Text Available I chose this topic because my goal was to capture in detail all aspects of the evolution of investment funds under the influence of factors leading to globalization of the banking financial market. Main motivation was that I proposed to present in an original manner the concept of investment in mutual funds by the thoroughness of the following points: the different types of investment funds from Romania, the advantages, the risks and the specific costs of the investment in mutual funds and the effects of the financial crisis on the industry of the investment funds on the national level. The financial crisis and the risk of infecting the global economy affected the taste of risk of the investors and their request for the investment fund, determining the orientation of the investors to the funds with a lower risk – the diversified funds, the funds of bonds and the monetary funds. I considered important the theoretical approach of the concept of investments in investment funds because they are a barometer of the macro economical stability, in case the economical increase is positive on the macro economical level the investments in investments funds are increasing too. In Romania the market of the mutual funds is at an incipient level, but with potential and perspectives of development. Due to the bankruptcy of FNI in the beginning of the years 2000 and due to the absence of a clear legislation regarding the calculation of the unitary value of the net asset and the control of the activity developed by the investment funds, the development of the industry of the investment funds had to fight against the crisis of credibility generated by these events. The convergence of the Romanian economy to the European standards will attract also a modification of the structure of the financial investments of the individuals, by an increase of the investments in funds. In the world the investment funds are preferred by the investors for their advantages

  2. Understaning the "funding effect"

    Science.gov (United States)

    Oreskes, N.

    2016-12-01

    There is a long history of industry funding of scientific and engineering research in the USA. Much of this work has been of high quality. Research demonstrates, however, that corporate funding can represent a threat to scientific independence and integrity. Studies show that sponsors' interests can affect research results, particularly when sponsors have a strong interest in a particular research outcome. The effects may occur through the impact of subconscious bias on sampling, study design, data interpretation, and/or reporting of results. Corporate funding can also skew research toward investigating certain questions at the expense of others, downplaying the significance of adverse findings, and/or failing to report adverse results. Gifts can affect behavior, even when they are unrelated to research activities. These impacts that are so substantial that they have a name: "the funding effect."[i] Evidence shows that scientists who strive to be objective and fair-minded may nonetheless fall prey to the funding effect. In many cases, the challenges of corporate gifts and funding can be addressed through education and improved self-awareness, agreements that protect researchers' freedom to publish without sponsor approval, sensible disclosure policies, and reasonable sanctions for failures of disclosure. However, in some cases, it may be appropriate for researchers and scientific societies to decline funding.

  3. Professionals' conduct as a condition for minimizing secondary victimization of the victims of spouse abuse

    Directory of Open Access Journals (Sweden)

    Ignjatović Tanja

    2009-01-01

    Full Text Available Through analysis of the 'administrative' aspects of experts' documentation kept by three services in one local community - the police station, the center for social welfare and the primary health care center, the possibility of reducing victimization of victims of partnership violence within the family is the subject of consideration. The results of the analysis point to the necessity of rationalization and standardization of recording and procedures by the professionals.

  4. Preservative treatments for building components

    Science.gov (United States)

    Stan Lebow

    2007-01-01

    The wood species most commonly used in construction have little natural durability Thus, they are treated with preservatives when used in conditions that favor biodeterioration. The type of preservative used varies with the type of wood product, exposure condition, and specific agent of deterioration. This paper discusses the characteristics of several preservative...

  5. Observer reactions to emotional victims of serious crimes : Stereotypes and expectancy violations

    NARCIS (Netherlands)

    Bosma, Alice; Mulder, Eva; Pemberton, Antony; Vingerhoets, Ad

    2018-01-01

    Negative observer reactions towards victims may be related to people’s expectations of the characteristics and demeanor of an ideal victim. We examined how expressed emotion, victim sex, and type of victimization influence observers’ perceptions of victim credibility, victim character, and harm. Our

  6. Revictimization of Victims Sexually Abused by Women

    Directory of Open Access Journals (Sweden)

    Małgorzata H. Kowalczyk

    2017-07-01

    Full Text Available Victims experiencing the sexual abuse are surviving not only physical injustice but above all deep traumas, which very often in different forms, are keeping them company through the entire life. Quite often at establishing different results a sex is underestimated for the perpetrator. Therefore knowing the problem of sexual abuses from a perspective of close as well as distant results is very important in the event that a woman was a perpetrator of these acts – mother, minder. In the present article based on analysis of literature, a problem of results of the sexual abuse was presented at victims which experienced these behaviours on the part of women. In order to draw up discussing the survived specificity by victims was both of sex of the trauma connected with the sexual application as well as close and distant consequences of these events in the form prime victimisation and revictimisation for figure being noticeable in the adult life of psychosexual disorders and social shortages. Amongst the consequence isolated traumatic factors are deserving the particular attention about dynamic character which are provoking the appearance of many symptoms characteristic of children which experienced the sexual violence. Recalled factors it: traumatic sexualisation of child, the betrayal, the stigmatization and the helplessness. The specificity of these factors results from the fact that they will leave distant “tracks” in the psyche and they can undergo the additional reinforcement if a woman is a perpetrator of the sexual violence. It results from frequent attitudes of “denying” towards the sexual violence applied by women. In the study they pointed also at one of possible consequences of the revictimisation process copying patterns of behaviour connected with the sexual exploitation of children in their more late life by victims is which. This process resulting from the alternating identification of the perpetrator and the victim is starting

  7. CERN Pension Fund move

    CERN Multimedia

    HR Department

    2007-01-01

    The CERN Pension Fund has moved to new offices at the 5th floor of Building 5. The Benefits Service of the Fund will henceforth receive you in the offices: 5-5-017 - 5-5-021 - 5-5-023. We remind you that the office hours are: Tuesday/Wednesday/Thursday from 10 am to 12 am and from 3 pm to 5 pm. The Fund would like to take this opportunity to warmly thank all the persons involved in the Removal.

  8. A PERFORMANCE COMPARISON OF HEDGE FUNDS, HEDGED MUTUAL FUNDS AND HEDGE FUND ETFS

    OpenAIRE

    Shenyan Gu; Tina Zhang

    2015-01-01

    Hedged mutual funds and hedge fund ETFs are new entrants to the market thatallow individual investors to invest in funds using hedge fund strategies.   In this paper, we study the performance of these two funds relative to the traditional hedge funds to see if the three asset classes are comparable investments. We use four performance measurement models, including CAPM, Fama French three factor model, Carhart four factor model and Fung and Hsieh eight factor model, to test the fund...

  9. Decreases in the proportion of bullying victims in the classroom: Effects on the adjustment of remaining victims

    NARCIS (Netherlands)

    Garandeau, C.F.; Lee, Ihno A.; Salmivalli, Christina

    2018-01-01

    Sharing a classroom environment with other victimized peers has been shown to mitigate the adverse effects of peer victimization on children’s social and psychological adjustment. By extension, this study hypothesized that classroom reductions in the proportion of victims would be harmful for

  10. Irradiation's potential for preserving food

    International Nuclear Information System (INIS)

    Morrison, R.M.

    1986-01-01

    The first experimental studies on the use of ionizing radiation for the preservation of foods were published over thirty years ago (1, 2) . After a period of high expectations and perhaps exaggerated optimism a series of disappointments occurred in the late '60s .The first company specifically created to operate a food irradiation plant, Newfield Products Inc, ran into financial difficulties and had to close its potato irradiation facility in 1966. The irradiator, designed to process 15,000t of potatoes per month for inhibition of sprouting, was in operation during one season only. In 1968 the US Food an Drug Administration refused approval for radiation-sterilisation of ham and withdrew the approval it had granted in 1963 for irradiated bacon. An International Project on the Irradiation of Fruit and Fruit juices, created in 1965 at Seibersdorf, Austria, with the collaboration or 9 countries, ended with general disappointment after three years. The first commercial grain irradiator, built in the Turkish harbour town of Iskenderun by the International Atomic Energy Agency with funds from the United Nations Development Program, never received the necessary operating licence from the Turkish Government and had to be dismantled in 1968. The US Atomic Energy Commission terminated its financial support to all research programmes on food irradiation in 1970. For a number of years, little chance seemed to remain that the new process would ever be practically used. However, research and development work was continued in a number of laboratories all over the world, and it appears that the temporary setbacks now have been overcome. Growing quantities of irradiated foods are being marketed in several countries and indications are that irradiated foods will eventually be as generally accepted as are frozen, dried or heatsterilised foods

  11. Preservation of the Rotorua geysers

    International Nuclear Information System (INIS)

    Allia, R.G.; Lumb, T.

    1990-01-01

    This paper reports on the preservation of the Rotorua Geysers the geothermal activity at Rotorua, New Zealand, which has always been noted for its special cultural, tourist, and scientific values. A gradual increase in the drawoff of geothermal fluid through wells since the 1950s raised national concerns in the early 1980s when spring and geyser activity significantly declined. A government-funded monitoring program began in 1982 to establish the rate and cause of the decline in activity, as well as the magnitude of the drawoff. No new wells were permitted within 1.5 km of the geyser area. By late 1985, the monitoring program confirmed that drawdown of the geothermal field was linked to the drawoff by geothermal wells. It recommended that the drawoff could be reduced by 75% by well sharing and efficiency increases. The link between well discharges and the activity of thermal decline was disputed by the Rotorua Geothermal Users Association. By late 1986, the continuing decline in field pressure was considered to be serious, so the Government recommended compulsory closure of wells within 1.5 km of the geysers, and imposed a charging policy for geothermal usage elsewhere in Rotorua. The closures were battled in the High Court, and subsequently there was also considerable local resistance and publicity to the forced entry onto private land by authorities trying to cement up wells. The combination of enforced well closures, and what was considered by some to be punitive charges for geothermal usage, resulted in an 80% reduction in geothermal well discharges by late 1989. Some of hot spring activity has returned, and geyser activity is more intense. Recently, some residents have been concerned that cooled former thermal areas near houses may be heating up again, and that the well closures have also caused a dangerous build up in gas pressure near surface. This claim is presently being investigated

  12. Fertility Preservation in Girls

    Directory of Open Access Journals (Sweden)

    Jennia Michaeli

    2012-01-01

    Full Text Available Children that undergo treatment for cancer are at risk of suffering from subfertility or hormonal dysfunction due to the detrimental effects of radiotherapy and chemotherapeutic agents on the gonads. Cryopreservation of ovarian tissue prior to treatment offers the possibility of restoring gonadal function after resumption of therapy. Effective counseling and management of pediatric patients is crucial for preserving their future reproductive potential. The purpose of this article is to review recent literature and to revise recommendations we made in a 2007 article. Pediatric hemato-oncology, reproductive endocrinology, surgery, anesthesia and bioethics perspectives are discussed and integrated to propose guidelines for offering ovarian cryopreservation to premenarcheal girls with cancer.

  13. Radiation preservation of spices

    International Nuclear Information System (INIS)

    Badshah, A.; Tasnim, A.; Khan, M.; Sattar, A.; Khan, I.

    1989-01-01

    The use of gamma irradiation for preservation of red hot pepper has been explained in report, as it can kill the harmful organisms without altering the organolpetic properties. The sample were dried and reduced to pass through 20 mesh. The samples were irradiated at different dose levels of 0, 2.5, 5.0, 7.5 and 10.0 KGy and results have been shown after different time intervals. Radiation and packaging treatments resulted normaly no effect on the color of dry fruits. (A.B)

  14. General IDRC Funding Guidelines

    International Development Research Centre (IDRC) Digital Library (Canada)

    Loretta Rocca

    Financial and Administrative Assessment ... the organization has independent legal status (or 'legal personality') and is capable of contracting ... Books and journal articles generated from IDRC-funded projects will be made accessible free of.

  15. Mutual aid fund commission

    CERN Multimedia

    Staff Association

    2011-01-01

    The composition of the Board of the Mutual Aid Fund for 2011 is as follows: President: Pascal Droux Vice-president: Connie Potter Treasurer: Louis Pereira Deputy treasurer: Barbara Brugger Secretary: Sonia Casenove Deputy secretary: Isabelle Mardirossian Members: Christopher David Thomas   Jean-Claude Vialis (GAC member)   Marie-Luce Falipou   Gunilla Santiard (Jean-Claude Vialis’s alternate) The role of the Fund is to provide financial help to members of personnel and beneficiaries of the Pension Fund who are in need of exceptional financial assistance. All requests are treated in the strictest confidence. Should you wish to apply for aid from the Fund, kindly contact any member of the Board as given above or Social Services, tel.74479 – 73867.

  16. Funding begets biodiversity

    DEFF Research Database (Denmark)

    Ahrends, Antje; Burgess, Neil David; Gereau, Roy E.

    2011-01-01

    Aim Effective conservation of biodiversity relies on an unbiased knowledge of its distribution. Conservation priority assessments are typically based on the levels of species richness, endemism and threat. Areas identified as important receive the majority of conservation investments, often...... facilitating further research that results in more species discoveries. Here, we test whether there is circularity between funding and perceived biodiversity, which may reinforce the conservation status of areas already perceived to be important while other areas with less initial funding may remain overlooked......, and variances decomposed in partial regressions. Cross-correlations are used to assess whether perceived biodiversity drives funding or vice versa. Results Funding explained 65% of variation in perceived biodiversity patterns – six times more variation than accounted for by 34 candidate environmental factors...

  17. The reciprocal relationship between sexual victimization and sexual assertiveness.

    Science.gov (United States)

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  18. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  19. The displacement of archaeological structures in Spain. Relocate to preserve, preserve to present

    Directory of Open Access Journals (Sweden)

    Víctor Manuel López-Menchero Bendicho

    2011-01-01

    Full Text Available Clearly it is not always feasible to conserve and exhibit the archaeological remains in situ, either for lack of funds in some cases, or for manifest incompatibility with the new land uses in others. This second case mix, ie the need to "free" land for new uses, sentences, in most cases, the archaeological remains to suffer a partial destruction since only movable materials are extracted, preserved and in some cases presented to the public, while the unmovable archaeological heritage, ie fixed archaeological structures, is destroyed, once it has been "properly" documented. However, in this field there is a kind of third way in which archaeological remains, including structures, are preserved and on display, while clearing the ground originally occupied. It is the displacement of archaeological structures. This article discusses the long history of such interventions in the Spanish case, making a typological classification proposal and finally a critical appraisal.

  20. Safe Harbor Legislation for Juvenile Victims of Sex Trafficking: A Myopic View of Improvements in Practice

    Directory of Open Access Journals (Sweden)

    Kimberly Mehlman-Orozco

    2015-02-01

    Full Text Available Current social and political realties have focused attention on human trafficking in the United States. Although new mechanisms for criminalizing offenders and protecting victims are increasingly funded and implemented across the country, empirical exploration into the efficacy of these interventions is lacking. This article uses yearly count data on juvenile prostitution arrests aggregated at the state level to explore the criminalization of commercial sexually exploited children post safe harbor policy implementation. Preliminary data from four states suggests that the passage of safe harbor laws may not reduce the number of juveniles arrested for prostitution crimes. Implications for future research are discussed.

  1. Annual Pension Fund Update

    CERN Multimedia

    Pension Fund

    2011-01-01

    All members and beneficiaries of the Pension Fund are invited to attend the Annual Pension Fund Update to be held in the CERN Council Chamber on Tuesday 20 September 2011 from 10-00 to 12-00 a.m. Copies of the 2010 Financial Statements are available from departmental secretariats. Coffee and croissants will be served prior to the meeting as of 9-30 a.m.

  2. Pension Fund Investment Policy

    OpenAIRE

    Zvi Bodie

    1988-01-01

    The purpose of this paper is to survey what is known about the investment policy of pension funds. Pension fund investment policy depends critically on the type of plan: defined contribution versus defined benefit. For defined contribution plans investment policy is not much different than it is for an individual deciding how to invest the money in an Individual Retirement Account (IRA). The guiding principle is efficient diversification, that is, achieving the maximum expected return for any...

  3. Funds for the Future. Report of the Twentieth Century Fund Task Force on College and University Endowment Policy.

    Science.gov (United States)

    Williamson, J. Peter

    The Task Force on College and University Endowment Policy examines endowment policy in a broad context. They feel that it is important to preserve private colleges and universities and develop a sense of mission about how best to pursue this objective. The Task Force reviews policy issues faced by managers of endowment funds for institutions of…

  4. Mutual preservation of entanglement

    International Nuclear Information System (INIS)

    Veitia, Andrzej; Jing, Jun; Yu, Ting; Wong, Chee Wei

    2012-01-01

    We study a generalized double Jaynes–Cummings (JC) model where two entangled pairs of two-level atoms interact indirectly. We show that there exist initial states of the qubit system so that two entangled pairs are available at all times. In particular, the minimum entanglement in the pairs as a function of the initial state is studied. Finally, we extend our findings to a model consisting of multi-mode atom–cavity interactions. We use a non-Markovian quantum state diffusion (QSD) equation to obtain the steady-state density matrix for the qubits. We show that the multi-mode model also displays dynamical preservation of entanglement. -- Highlights: ► Entanglement dynamics is studied in a generalized double Jaynes–Cummings model. ► We show that for certain initial states, the atoms remain entangled at all times. ► We extend the results to the case of multi-mode atom–cavity interactions. ► The model suggest that indirect interaction may help to preserve entanglement.

  5. PENSION FUND - ELECTIONS

    CERN Multimedia

    2000-01-01

    This candidature has been duly registered and is hereby presented in accordance with paragraph 6.h of the Regulations for Elections to the Governing Board of the Pension Fund.   Candidate: Name: RANJARD First Name: Florence Having been a member of the Governing Board of the Pension Fund since 1983 as Guy Maurin’s alternate, I am standing for a further 3-year term of office. Over the past few years work has concentrated essentially on following items: Monitoring of the work of the fund managers and their performances. The three-yearly study of the Fund’s actuarial situation. The pension guarantees ­ second phase. The Fund is approaching its maturity: the level of benefits exceeds contributions. In this context it has to strike a suitable balance between management of the risk from a dynamic investment policy, while by a prudent policy avoiding any significant loss of its capital. These will be my concerns within the Governing Board of the Pension Fund if you give me your support.

  6. Victims of crime, with special emphasis on victims of work abuse and domestic violence: Analysis of the service VDS info and victim support for 2009

    Directory of Open Access Journals (Sweden)

    Radaković Danica

    2010-01-01

    Full Text Available The aim of this paper is to present the work of the VDS info and victim support service for the period January 1st 2009 - December 31st 2009. It contains the data about victims, type and quality of assistance and support provided by the Service, and also about institutions and organizations the victims contacted before or after contacting the Service and their satisfaction with the help they received.

  7. Behavioral and Mental Health Correlates of Youth Stalking Victimization

    Science.gov (United States)

    Reidy, Dennis E.; Smith-Darden, Joanne P.; Kernsmith, Poco D.

    2018-01-01

    Introduction Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. Methods A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Results Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. Conclusions These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. PMID:27743623

  8. Child victims and poly-victims in China: are they more at-risk of family violence?

    Science.gov (United States)

    Chan, Ko Ling

    2014-11-01

    Multiple forms of violence may co-occur on a child. These may include various forms of child victimization and different types of family violence. However, evidence that child victims are more likely to witness other types of family violence has been lacking in China. Using data of a large and diverse sample of children recruited from 6 regions in China during 2009 and 2010 (N=18,341; 47% girls; mean age=15.9 years), the associations between child victimization and family violence witnessed were examined. Descriptive statistics and the associations between child victimization, demographic characteristics, and family violence witnessed were analyzed. Lifetime and preceding-year rates were 71.7% and 60.0% for any form of child victimization and 14.0% and 9.2% for poly-victimization (having four or more types of victimization), respectively. Family disadvantages (i.e., lower socio-economic status, single parents, and having more than one child in the family) were associated with child victimization and poly-victimization. Witnessing of parental intimate partner violence, elder abuse, and in-law conflict also increased the likelihood of child victimization and poly-victimization, even after the adjustment of demographic factors. Possible mechanisms for the links between family violence and child victimization are discussed. The current findings indicated the need for focusing on the whole family rather than the victim only. For example, screening for different types of family violence when child victims are identified may help early detection of other victims within the family. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization.

    Science.gov (United States)

    Hamby, Sherry; Blount, Zach; Smith, Alli; Jones, Lisa; Mitchell, Kimberly; Taylor, Elizabeth

    2018-01-01

    Many forms of victimization, including bullying and property crime, are increasingly moving online, but most studies of poly-victimization still primarily focus on in-person crime and violence. Few studies have examined the importance of incorporating technology-based victimizations for assessing the true burden of violence. The purpose of this study is to explore whether digital poly-victimization contributes to post-traumatic stress and anxiety/dysphoria symptoms after controlling for in-person poly-victimization. Given that technology use and technology-based victimization are changing rapidly, a mixed methods approach was adopted. In the first two phases, focus groups and cognitive interviews (89 total participants) were used to identify the range of digital victimization and develop the Digital Poly-Victimization Scale. In the third phase, the new measure was included in a community survey (n = 478, 57.5% female; 62.6% earning under $50,000 per year) in a rural Southern region, along with measures of in-person poly-victimization, posttraumatic stress and anxiety/dysphoria symptoms, and other outcomes and personal characteristics. A comprehensive measure of digital poly-victimization indicated that almost 3 in 4 participants (72.3%) had experienced at least one form of digital victimization. The results indicated that digital poly-victimization contributed unique variance to post-traumatic stress and anxiety/dysphoria symptoms (p Digital victimization often presents fewer risks to perpetrators and can be expected to represent an increasing share of the societal burden of violence. Future research on poly-victimization should pay more attention to the role of digital victimization.

  10. Workplace mobbing: How the victim's coping behavior influences bystander responses.

    Science.gov (United States)

    Mulder, Roelie; Bos, Arjan E R; Pouwelse, Mieneke; van Dam, Karen

    2017-01-01

    Victims of workplace mobbing show diverse coping behavior. We investigated the impact of this behavior on bystander cognitions, emotions, and helping toward the victim, integrating coping literature with attribution theory. Adult part-time university students (N = 161) working at various organizations participated in a study with a 3(Coping: approach/avoidance/neutral) × 2(Gender Victim: male/female) × 2(Gender Bystander: male/female) design. Victims showing approach (vs. avoidance) coping were considered to be more self-reliant and less responsible for the continuation of the mobbing, and they elicited less anger. Continuation responsibility and self-reliance mediated the relationship between the victim's coping behavior and bystanders' helping intentions. Female (vs. male) participants reported more sympathy for the victim and greater willingness to help, and female (vs. male) victims elicited less anger. Theoretical and practical implications of the findings are discussed.

  11. The role of forensic anthropology in Disaster Victim Identification (DVI).

    Science.gov (United States)

    Blau, Soren; Briggs, Christopher A

    2011-02-25

    This paper briefly describes Disaster Victim Identification (DVI) and reviews the history of the use of forensic anthropology in the identification process. The potential contributions made by forensic anthropology are illustrated through the presentation of a case study. In February 2009 the state of Victoria in south-eastern Australia experienced the most devastating bushfires in its history, resulting in catastrophic loss of life and public and private property. Within 48h of the disaster, forensic teams including pathologists, odontologists and anthropologists assembled at the Victorian Institute of Forensic Medicine in Melbourne to begin the task of identifying the deceased. This paper reviews the part played by forensic anthropologists in the identification process and outlines the important contribution anthropologists can make to DVI, especially at the scene, in the mortuary and in the reconciliation process. The anthropologist's experience with differentially preserved human remains meant they played an important role identifying and recovering heavily fragmentary human skeletal remains, differentiating human from non-human remains, establishing basic biological information such as the sex and age of the individuals and confirming or denying the possibility of re-associating body parts for release to families. Crown Copyright © 2010. Published by Elsevier Ireland Ltd. All rights reserved.

  12. Preserving reptiles for research

    Science.gov (United States)

    Gotte, Steve W.; Jacobs, Jeremy F.; Zug, George R.; Dodd, C. Kenneth

    2016-01-01

    What are voucher specimens and why do we collect them? Voucher specimens are animals and/or their parts that are deposited in a research museum to document the occurrence of a taxon at a specific location in space and time (Pleijel et al., 2008; Reynolds and McDiarmid, 2012). For field biologists, vouchers are the repeatable element of a field study as they allow other biologists, now and in the future, to confirm the identity of species that were studied. The scientific importance of a voucher specimen or series of specimens is that other people are afforded the opportunity to examine the entire animal and confirm or correct identifications. A photographic record is somewhat useful for recording the occurrence of a species, but such records can be insufficient for reliable confirmation of specific identity. Even if a photo shows diagnostic characters of currently recognized taxa, it may not show characters that separate taxa that may be described in the future. Substantial cryptic biodiversity is being found in even relatively well-known herpetofaunas (Crawford et al., 2010), and specimens allow researchers to retroactively evaluate the true diversity in a study as understanding of taxonomy evolves. They enable biologists to study the systematic relationships of populations by quantifying variation in different traits. Specimens are also a source of biological data such as behaviour, ecology, epidemiology, and reproduction through examination of their anatomy, reproductive and digestive tracts, and parasites (Suarez and Tsutsui, 2004). Preserving reptiles as vouchers is not difficult, although doing it properly requires care, effort, and time. Poorly preserved vouchers can invalidate the results and conclusions of your study because of the inability to confirm the identity of your study animals. Good science requires repeatability of observations, and the absence of vouchers or poorly preserved ones prevents such confirmation. Due to space restrictions, we are

  13. Perception of secondary victimization in gender violence

    Directory of Open Access Journals (Sweden)

    María Aranda López

    2014-08-01

    Full Text Available Gender violence is a complex phenomenon that does not end with the removal of the abuser, as the abused person can experience secondary victimization. This study examined this process in a sample of 38 battered women. A multicausal approach was used to assess satisfaction with health system, the police, and the judiciary. The study also assessed the role of two variables that have remained unaddressed: family support and perceived danger. The results indicate that dissatisfaction with judicial treatment and legal action plays a key role in the perception of secondary victimization. It was also found that women who perceive less risk value the judicial system more because they do not need the system to take protective measures or other measures for them. Moreover, women who receive family support are more satisfied with the police system.

  14. ASD and PTSD in Rape Victims

    DEFF Research Database (Denmark)

    Elklit, Ask; Christiansen, Dorte M

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims...... shortly after the rape or attempted rape. The PTSD diagnosis based solely on the three core symptom clusters was best identified by a subclinical ASD diagnosis based on all ASD criteria except dissociation. However, a full PTSD diagnosis including the A2 and F criteria was best identified by classifying...... on ASD severity and sexual problems following the rape accounted for only 28% of the PTSD severity variance. In conclusion, the ASD diagnosis is not an optimal method for identifying those most at risk for PTSD. It remains to be seen whether a better way can be found....

  15. Maladaptive schemas as mediators of the relationship between previous victimizations in the family and dating violence victimization in adolescents.

    Science.gov (United States)

    Calvete, Esther; Gámez-Guadix, Manuel; Fernández-Gonzalez, Liria; Orue, Izaskun; Borrajo, Erika

    2018-07-01

    This study examined whether exposure to family violence, both in the form of direct victimization and witnessing violence, predicted dating violence victimization in adolescents through maladaptive schemas. A sample of 933 adolescents (445 boys and 488 girls), aged between 13 and 18 (M = 15.10), participated in a three-year longitudinal study. They completed measures of exposure to family violence, maladaptive schemas of disconnection/rejection, and dating violence victimization. The findings indicate that witnessing family violence predicts the increase of dating violence victimization over time, through the mediation of maladaptive schemas in girls, but not in boys. Direct victimization in the family predicts dating violence victimization directly, without the mediation of schemas. In addition, maladaptive schemas contribute to the perpetuation of dating violence victimization over time. These findings provide new opportunities for preventive interventions, as maladaptive schemas can be modified. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. La victima, el victimario y la justicia restaurativa / La victime, le criminel et la justice réparatrice / The victim, the offender and the restorative justice

    Directory of Open Access Journals (Sweden)

    Villarreal Sotelo Karla

    2013-03-01

    sens, la recherche criminologique et victimologique a le devoir de développer des méthodes, des modèles et des instruments qui peuvent être appliqués aux pratiques restauratrices dans le but de permettre aux victimes et aux citoyens de jouer un rôle majeur au sein de la justice. In 2008, Mexico adopted a constitutional reform that creates a new paradigm of restorative justice aimed to preserve the dignity of the victims and introduce innovative legal and social norms in law enforcement, such as peace and forgiveness. The restorative process will enable the victim, the offender and affected members of the community to: 1 participate in remedying the damage arising from the crime, 2 consider the victim as a member of the community, 3 promote reconciliation and reintegration of offender into the community. Restorative programs have been integrated into criminological and victimological thinking, providing new areas of study of these social actors involved in the criminal conflict, encouraging research to achieve true restorative justice. In this sense, criminological and victimological research have the duty to develop methods, models and tools that can be applied successfully to restorative justice programs in order to enable victims and citizens to play a greater role in the justice process.

  17. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Gottschalk, M.

    1978-01-01

    In November, 1977, an International Symposium on Food Preservation by Irradiation was held at Wageningen, the Netherlands. About 200 participants attended the Symposium which was organised by the International Atomic Energy Agency, the Food and Agriculture Organization of the United Nations and the World Health Organization; a reflection of the active interest which is being shown in food irradiation processing, particularly among developing countries. The 75 papers presented provided an excellent review of the current status of food irradiation on a wide range of different topics, and the Symposium also afforded the valuable opportunity for informal discussion among the participants and for developing personal contacts. A brief survey of the salient aspects discussed during the course of the meeting are reported on. (orig.) [de

  18. Nurturer, Victim, Seductress: Gendered Roles in Terrorism

    Science.gov (United States)

    2018-04-20

    Becomes Her: The Changing Roles of Women’s Role in Terror." Georgetown Journal of International Affairs, Winter/Spring 2010: 91-98. ———. Dying to Kill...ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION . REPORT NUMBER Joint Forces Staff College Joint Advanced Warflghting School 7800 Hampton Blvd...STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL Nurturer, Victim, Seductress: Gendered Roles in

  19. Internet piracy and consequences for victims

    OpenAIRE

    Savić Miljan; Petrović Nikola M.

    2016-01-01

    After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total...

  20. Funding Decommissioning - UK Experience

    International Nuclear Information System (INIS)

    MacKerron, Gordon

    2006-01-01

    'Funding' started with CEGB and SSEB (state-owned electric utilities) in 1976 using the internal un-segregated fund route (i.e unfunded). This continued until privatisation of electricity industry (excluding nuclear) in 1990. Assets bought with the internal un-segregated fund were mostly transferred into non-nuclear private utilities. New state-owned Nuclear Electric (England and Wales) was given a 'Fossil Fuel Levy', a consumer charge of 10% on retail bills, amounting to c. BP 1 bn. annually. This allowed Nuclear Electric to trade legally (A reserve of BP 2.5 bn. was available from Government if company ran out of money). By 1996 the newer nuclear stations (AGRS plus PWR) were privatised as British Energy. British Energy started an external segregated fund, the Nuclear Decommissioning Fund, with a starting endowment of c. BP 225 m. - and BE made annual contributions of British Pound 16 m. into the Fund. Assumptions were that BE had 70 to accumulate cash and could get a 3.5% average annual real return. Older stations (Magnox) were left in private sector and went to BNFL in 1997. Magnox inherited the surplus cash in BE - mostly unspent Fossil Fuel Levy receipts - of c. BP 2.6 bn. Government gave an 'Undertaking' to pay BP 3.8 bn. (escalating at 4.5% real annually) for Magnox liabilities, should Magnox Electric run out of cash. BNFL inherited the BP 2.6 bn. and by 2000 had a 'Nuclear Liabilities Investment Portfolio' of c. BP 4 bn. This was a quasi-segregated internal fund for liabilities in general. [Note: overall UK nuclear liabilities in civilian sector were running at c. BP 48 bn. by now]. BE started profitable and paid BP 100 m. annually in dividends to private investors for several years. BE ran into severe financial problems after 2001 and Government organised restructuring aid, now approved by European Commission. Terms include: - BE now to contribute BP 20 m. a year into an expanded Nuclear Liabilities Fund; - A bond issue of BP 275 m. to go to Fund; - 65

  1. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Provider Pocket Guides Provider Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ... Patient Pocket Guides Patient Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ...

  2. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ...

  3. A TODAY VICTIM OF SECOND WORLD WAR.

    Science.gov (United States)

    Hăisan, Anca; Dumea, Mihaela; Ursaru, Manuela; Bulat, C; Cimpoeşu, Diana Carmen

    2015-01-01

    Emergency medicine as a medical specialty has to deal with all kind of emergency situations, from medical to post traumatic acute eyents and from new born to the elderly persons, but also with particular situations like explosions. In Romania nowadays these are accidental explosions and rare like frequency, but may be dramatic due to numbers of victims and multisystem injury that may occur. We present a case of a single victim of accidental detonated bomb, a projectile from the Second World War, which unfortunately still may be found in some areas. The management of the case from first call to 112 until the victim is discharge-involves high professional team work. We use these opportunity to make a brief review of the mechanism through the lesions may appear and also to renew the fact that the most impressive lesion may not be the most severe, and we have to examine carefully in order to find the real life threatening injury of the patient.

  4. Parenting behavior and the risk of becoming a victim and a bully/victim: a meta-analysis study.

    Science.gov (United States)

    Lereya, Suzet Tanya; Samara, Muthanna; Wolke, Dieter

    2013-12-01

    Being bullied has adverse effects on children's health. Children's family experiences and parenting behavior before entering school help shape their capacity to adapt and cope at school and have an impact on children's peer relationship, hence it is important to identify how parenting styles and parent-child relationship are related to victimization in order to develop intervention programs to prevent or mitigate victimization in childhood and adolescence. We conducted a systematic review of the published literature on parenting behavior and peer victimization using MEDLINE, PsychINFO, Eric and EMBASE from 1970 through the end of December 2012. We included prospective cohort studies and cross-sectional studies that investigated the association between parenting behavior and peer victimization. Both victims and those who both bully and are victims (bully/victims) were more likely to be exposed to negative parenting behavior including abuse and neglect and maladaptive parenting. The effects were generally small to moderate for victims (Hedge's g range: 0.10-0.31) but moderate for bully/victims (0.13-0.68). Positive parenting behavior including good communication of parents with the child, warm and affectionate relationship, parental involvement and support, and parental supervision were protective against peer victimization. The protective effects were generally small to moderate for both victims (Hedge's g: range: -0.12 to -0.22) and bully/victims (-0.17 to -0.42). Negative parenting behavior is related to a moderate increase of risk for becoming a bully/victim and small to moderate effects on victim status at school. Intervention programs against bullying should extend their focus beyond schools to include families and start before children enter school. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. ELECTIONS - Pension Fund

    CERN Multimedia

    2006-01-01

    CERN - EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH PENSION FUND ELECTIONS - Pension Fund This candidature has been duly registered and is hereby presented in accordance with paragraph 6.h of the Regulations for Elections to the Governing Board of the Pension Fund. Candidate: First name: Michel Name: Goossens The CERN/ESO Pension Fund represents, for most staff, the sole source of income when they retire. The health of our Pension Fund is thus of the utmost importance to ensure the payment of pensions up to the death of the last beneficiary. The 2003 actuarial review showed a large deficit and several corrective measures have already been taken. The next months will see the results of the 2006 actuarial review. We hope they will show that the measures taken last year are going in the right direction. However, we must remain proactive since further measures will no doubt be necessary. New and imaginative proposals must be prepared and discussed in the widest possible forum, by regular direct contact with staf...

  6. ELECTIONS - Pension Fund

    CERN Multimedia

    2006-01-01

    CERN - EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH PENSION FUND ELECTIONS - Pension Fund This candidature has been duly registered and is hereby presented in accordance with paragraph 6.h of the Regulations for Elections to the Governing Board of the Pension Fund. Candidate: First name: Michel Name: Goossens The CERN/ESO Pension Fund represents, for most staff, the sole source of income when they retire. The health of our Pension Fund is thus of the utmost importance to ensure the payment of pensions up to the death of the last beneficiary. The 2003 actuarial review showed a large deficit and several corrective measures have already been taken. The next months will see the results of the 2006 actuarial review. We hope they will show that the measures taken last year are going in the right direction. However, we must remain proactive since further measures will no doubt be necessary. New and imaginative proposals must be prepared and discussed in the widest possible forum, by regular direct contact with staff...

  7. ELECTIONS - Pension Fund

    CERN Multimedia

    2006-01-01

    CERN - EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH PENSION FUND ELECTIONS - Pension Fund This candidature has been duly registered and is hereby presented in accordance with paragraph 6.h of the Regulations for Elections to the Governing Board of the Pension Fund. Candidate: First name: Michel Name: Goossens The CERN/ESO Pension Fund represents, for most staff, the sole source of income when they retire. The health of our Pension Fund is thus of the utmost importance to ensure the payment of pensions up to the death of the last beneficiary. The 2003 actuarial review showed a large deficit and several corrective measures have already been taken. The next months will see the results of the 2006 actuarial review. We hope they will show that the measures taken last year are going in the right direction. However, we must remain proactive since further measures will no doubt be necessary. New and imaginative proposals must be prepared and discussed in the widest possible forum, by regular direct contact ...

  8. ELECTIONS PENSION FUND

    CERN Multimedia

    2001-01-01

    ORGANISATION EUROPEENNE POUR LA RECHERCHE NUCLEAIRE CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CAISSE DE PENSIONS / PENSION FUND Caisse de Pensions - ELECTIONS - Pension Fund This candidature has been duly registered and is hereby presented in accordance with paragraph 6.h of the Regulations for Elections to the Governing Board of the Pension Fund. Candidate : Name : CHIAVERI First Name : Enrico I have been a CERN staff member since 1973 and have always been interested in our working conditions. As a member of the Executive Committee of the Staff Association I participated from 1980 to 1984 in the Working Group on Pensions mandated by the CERN Council. This commitment led to my becoming a member of the Governing Board of the Pension Fund in 1983, since when I have taken an active part in various commissions and working groups (Real Estate Asset Management Committee, Working Group on Actuarial Matters etc.); in so doing I have gained a thorough knowledge of different areas of the Pension Fund. Since ...

  9. Innovative funding solution for special projects: Crowd funding

    Directory of Open Access Journals (Sweden)

    Sentot Imam Wahjono

    2015-06-01

    Full Text Available The aim of this paper is to examine the influence of crowd funding knowledge, applica-tion, platform, and project initiator toward successful crowd funding. This study conducted by quantitative approach, data have been collected with web-based ques-tionnaires via Kickstarter.com direct message and e-mail to 200 successful crowd funding project initiators as a sample and as much 152 sets questionnaire returned by a complete answer and should be analyzed further. Deployment and data collection take 3 month from October to December 2013. This study found evidence that crowd funding knowledge, crowd funding application, crowd funding platform, and project initiator has positive and significant relationship toward the success of crowd funding. The implication from this research is crowd funding can be a source of capital to finance the projects, not just rely on traditional sources of financing just like banking and capital markets. Crowd funding can be innovative funding solution.

  10. Victim support services in England, Wales and Northern Ireland

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2002-01-01

    Full Text Available In the paper, authors tried to present activities of one of the oldest European Victim Support Services - Victim Support for England, Wales and Northern Ireland. During 1970s, through practice and research projects, the need for recognizing the physical and psychological status of victims after the crime was committed, as well as the need of providing them with the (informal assistance and support were noticed. That has resulted in establishing numerous of local victim support services (schemes, which united in the National Association of the Victim Support Services in 1979. Significant support was given to the Service in 1980s through the recommendations of the Council of Europe on the assistance for victims of crime and prevention of victimization through direct support given to the victim immediately after the incident, including protection and safety, medical, mental, social and financial support, as well as providing the victim with information on his/her rights, support during the criminal proceeding, assistance in getting compensation etc. Organization and structure of the service, referral system, code of practice and two main programs: Victim Service and Witness Service are reviewed in the paper.

  11. Network Exposure and Homicide Victimization in an African American Community

    Science.gov (United States)

    Wildeman, Christopher

    2014-01-01

    Objectives. We estimated the association of an individual’s exposure to homicide in a social network and the risk of individual homicide victimization across a high-crime African American community. Methods. Combining 5 years of homicide and police records, we analyzed a network of 3718 high-risk individuals that was created by instances of co-offending. We used logistic regression to model the odds of being a gunshot homicide victim by individual characteristics, network position, and indirect exposure to homicide. Results. Forty-one percent of all gun homicides occurred within a network component containing less than 4% of the neighborhood’s population. Network-level indicators reduced the association between individual risk factors and homicide victimization and improved the overall prediction of individual victimization. Network exposure to homicide was strongly associated with victimization: the closer one is to a homicide victim, the greater the risk of victimization. Regression models show that exposure diminished with social distance: each social tie removed from a homicide victim decreased one’s odds of being a homicide victim by 57%. Conclusions. Risk of homicide in urban areas is even more highly concentrated than previously thought. We found that most of the risk of gun violence was concentrated in networks of identifiable individuals. Understanding these networks may improve prediction of individual homicide victimization within disadvantaged communities. PMID:24228655

  12. Alcohol Involvement in Homicide Victimization in the U.S

    Science.gov (United States)

    Naimi, Timothy S.; Xuan, Ziming; Cooper, Susanna E.; Coleman, Sharon M.; Hadland, Scott E.; Swahn, Monica H.; Heeren, Timothy C.

    2016-01-01

    Background Although the association between alcohol and homicide is well documented, there has been no recent study of alcohol involvement in homicide victimization in U.S. states. The objective of this paper was to determine the prevalence of alcohol involvement in homicide victimization and identify socio-demographic and other factors associated with alcohol involvement in homicide victimization. Methods Data from homicide victims with a reported blood alcohol content (BAC) level were analyzed from 17 states from 2010–12 using the National Violent Death Reporting System. Logistic regression was used to investigate factors associated with the odds of homicide victims having a BAC ≥0.08%. Results Among all homicide victims, 39.9% had a positive BAC including 13.7% with a BAC between 0.01%–0.79% and 26.2% of victims with a BAC ≥0.08%. Males were twice as likely as females to have a BAC ≥0.08% (29.1% vs. 15.2%; p homicide victims having a BAC ≥0.08 included male sex, American Indian/Alaska Native race, Hispanic ethnicity, history of intimate partner violence, and non-firearm homicides. Conclusions Alcohol is present in a substantial proportion of homicide victims in the U.S., with substantial variation by state, demographic and circumstantial characteristics. Future studies should explore the relationships between state-level alcohol policies and alcohol-involvement among perpetrators and victims of homicide. PMID:27676334

  13. Childhood victimization experiences of young adults in St. Petersburg, Russia.

    Science.gov (United States)

    Bogolyubova, Olga; Skochilov, Roman; Smykalo, Lyubov

    2015-04-01

    The purpose of this study was to assess the prevalence of childhood victimization experiences in a sample of young adults in St. Petersburg, Russia. The study sample included 743 students aged 19 to 25 from 15 universities in St. Petersburg, Russia. All of the study participants completed a reliable questionnaire assessing the following types of childhood victimization: conventional crime, child maltreatment, peer victimization, sexual victimization, and witnessing violence. Participation in the study was anonymous. High rates of victimization and exposure to violence were reported by the study participants. The majority of the sample experienced at least one type of victimization during childhood or adolescence, and poly-victimization was reported frequently. The most common type of victimization reported was peer or sibling assault (66.94%), followed by witnessing an assault without weapon (63.91%), personal theft (56.19%), vandalism (56.06%), and emotional bullying (49.99%). Sexual assault by a known adult was reported by 1.45% males and 5.16% of females. This study provides new information on the scope of childhood victimization experiences in Russia. Further research is warranted, including epidemiological research with representative data across the country and studies of the impact of trauma and victimization on mental health and well-being of Russian adults and children. © The Author(s) 2014.

  14. Pension Fund Governing Board

    CERN Multimedia

    HR Department

    2008-01-01

    Note The CERN pension scheme is based on the principle of defined benefits, so beneficiaries continue to receive the benefits to which they are entitled in accordance with the Rules of the Pension Fund. This means that pension entitlements under the Rules are not directly affected by the financial crisis and the current economic situation. However, the adjustment of pensions to the cost of living is not automatic and, under the method applied since 2006, must take into account the Fund’s financial position. Meeting of the Pension Fund Governing Board The Pension Fund Governing Board held its eighth meeting at ESO in Garching, Germany (near Munich) on 24 October 2008. Before starting its work, the Governing Board had the privilege of hearing an opening address by Professor Tim de Zeeuw, the Director General of ESO. Professor de Zeeuw described the mission of ESO and the ambitious projects of his organisation, which performs astronomy observations using telescopes located in...

  15. Pension Fund governing board

    CERN Multimedia

    HR Department

    2008-01-01

    On 16 March and 7 May, the Pension Fund Governing Board (PFGB) held its fourth and fifth meetings The first of these meetings was primarily dedicated to the examination of the strategic asset allocation. The PFGB reaffirmed the main goal of the new strategic asset allocation: to improve the Pension Fund’s position with regard to risk by lowering overall portfolio volatility through suitable investments in less volatile asset classes such as real estate and absolute return strategies, where the return does not depend on market trends and negative growth is extremely unlikely. The finalised document will be presented to the Finance Committee and the Council at their June meetings for approval, in accordance with the provisions of the Levaux report. The PFGB also took note of the Internal Audit’s report on Pension Fund operations and decided to refer it to Working Group I as a working document for establishing a control and internal monitoring system for Pension Fund oper...

  16. Casemix funding in Australia.

    Science.gov (United States)

    Braithwaite, J; Hindle, D; Phelan, P D; Hanson, R

    1998-06-01

    Casemix funding for hospitals with the use of diagnosis-related groups (DRGs), which organise patients' conditions into similar clinical categories with similar costs, was introduced in Australia five years ago. It has been applied in different ways and to a greater or lesser extent in different Australian States. Only Victoria and South Australia have implemented casemix funding across all healthcare services. Attempts have been made to formally evaluate its impact, but they have not met the required scientific standards in controlling for confounding factors. Casemix funding remains a much-discussed issue. In this Debate, Braithwaite and Hindle take a contrary position, largely to stimulate policy debate; Phelan defends the casemix concept and advocates retaining its best features; and Hanson adds a plea for consumer input.

  17. The Association Between Familial Homelessness, Aggression, and Victimization Among Children.

    Science.gov (United States)

    Jetelina, Katelyn K; Reingle Gonzalez, Jennifer M; Cuccaro, Paula M; Peskin, Melissa F; Elliott, Marc N; Coker, Tumaini R; Mrug, Sylvie; Davies, Susan L; Schuster, Mark A

    2016-12-01

    The purpose of this study was to evaluate the relationship between the number of periods children were exposed to familial homelessness and childhood aggression and victimization. Survey data were obtained from 4,297 fifth-grade children and their caregivers in three U.S. cities. Children and primary caregivers were surveyed longitudinally in 7th and 10th grades. Family homelessness, measured at each wave as unstable housing, was self-reported by the caregiver. Children were categorized into four mutually exclusive groups: victim only, aggressor only, victim-aggressor, and neither victim nor aggressor at each time point using validated measures. Multinomial, multilevel mixed models were used to evaluate the relationship among periods of homelessness and longitudinal victimization, aggression, and victim aggression compared to children who were nonvictims and nonaggressors. Results suggest that children who experienced family homelessness were more likely than domiciled children to report aggression and victim aggression but not victimization only. Multivariate analyses suggested that even brief periods of homelessness were positively associated with aggression and victim aggression (relative to neither) compared to children who were never homeless. Furthermore, childhood victimization and victim aggression significantly decreased from 5th grade to 10th grade while aggression significantly increased in 10th grade. Children who experienced family homelessness for brief periods of time were significantly more likely to be a victim-aggressor or aggressor compared to those who were never homeless. Prevention efforts should target housing security and other important factors that may reduce children's likelihood of aggression and associated victimization. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Victimization by Siblings in Children with Disability or Weight Problems.

    Science.gov (United States)

    Tucker, Corinna J; Finkelhor, David; Turner, Heather

    Children with a physical disability, psychological disorder, or of nonnormative weight are often targets of peer victimization. Sibling victimization, however, is more common than peer victimization, but rarely explored. We investigated linkages between sibling victimization and whether children had a physical disability, psychological disorder (i.e., internalizing disorder, attention deficit disorder/attention-deficit hyperactivity disorder), and were perceived by parents as being thinner than average or overweight. Also, we explored how the extent and kinds of sibling victimization experiences were related to these characteristics in childhood. A US probability sample of adult caregivers of a child aged 0 to 9 (N = 780; 50% women; mean age 4.58) in 2-child households who completed a telephone interview. Controlling for other forms of maltreatment and individual and family characteristics, children with a physical disability and parent-perceived children who are thinner than average and children who are overweight experienced more sibling victimization. Children with an internalizing disorder experienced less sibling victimization. Sibling victimization did not differ for children with and without ADHD. Children perceived to be overweight by parents and children with a physical disability were at increased risk of experiencing more types of sibling victimization. Children with a physical disability had greater odds of being victims of property victimization by a sibling. Children with a physical disability or perceived as different from average weight are at risk for sibling victimization. Using a nationally representative sample, this is the first study to highlight the importance of screening for sibling victimization in families of children with a disability and/or nonnormative weight status.

  19. Family as a factor of risk prevention and victim behaviour

    Directory of Open Access Journals (Sweden)

    Artur A. Rean

    2015-03-01

    Full Text Available The paper examines psychological factors victim behaviour. The definition of victim behaviour is given and it is emphasized that such conduct is not necessarily passivebehaviour of the victim. Victimization and behaviour can be active and aggressive. It is shown that antisocial, deviant behaviour of children and adolescents seriously increases the risk of victimization. Family as the most important institution of socialization is considered both as a preventing factor and risk factor of victim behaviour. The role of the family in shaping the victim behaviour is revealed in the following issues: aggressive, conflict behaviour is personal inclination or absence of the “proper” skills; interdependence of the severity of punishment and child aggression; punishment for child aggression (between siblings: what is the result?; ignoring aggression – is it the best solution?; victims of sexual violence and causes of victim behaviour; demonstrative accentuation as a risk factor in rape victim behaviour; happy family – can it be a risk factor for victim behaviour? For a long time, social deviant personality development has been believed to deal with structural deformation of the family, which is defined as a single-parent family, i.e. absence of one parent (usually the father. It is now proved that the major factor of family negative impact on personal development is not structural but psychosocial family deformation. A really happy family, psychologically happy family is the cornerstone of preventing victim behaviour. The victim behaviour being mainly determined by personal qualities does not negate this conclusion, but only strengthens it, as the qualities mentioned above are shaped in many respects within family socialization, are determined by family upbringing styles and features of interpersonal relationships inside the family.

  20. Mean-Preserving-Spread Risk Aversion and The CAPM

    OpenAIRE

    Phelim P. Boyle; Chenghu Ma

    2013-01-01

    This paper establishes conditions under which the classical CAPM holds in equilibrium. Our derivation uses simple arguments to clarify and extend results available in the literature. We show that if agents are risk averse in the sense of mean-preserving-spread (MPS) the CAPM will necessarily hold, along with two-fund separation. We derive this result without imposing any distributional assumptions on asset returns. The CAPM holds even when the market contains an infinite number of securities ...

  1. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  2. Funding strategies for wilderness management

    Science.gov (United States)

    Carolyn Alkire

    2000-01-01

    Funding wilderness protection will continue to be a challenge for public land managers. With continuing competition for federal funds and balanced budget goals, other sources of funds may be necessary to supplement annual federal appropriations. This paper identifies and evaluates five potential funding strategies and provides examples of each that are currently in use...

  3. Impact of sexual harassment victimization by peers on subsequent adolescent victimization and adjustment: a longitudinal study.

    Science.gov (United States)

    Chiodo, Debbie; Wolfe, David A; Crooks, Claire; Hughes, Ray; Jaffe, Peter

    2009-09-01

    To examine gender differences in prevalence and types of sexual harassment victimization experienced in grade 9 and how it contributes to relationship victimization and psychological adjustment 2.5 years later. A total of 1734 students from 23 schools completed self-report surveys at entry to grade 9 and end of grade 11. Self-report data were collected on victimization experiences (sexual harassment, physical dating violence, peer violence, and relational victimization) and adjustment (emotional distress, problem substance use, self-harm, suicidal thoughts, maladaptive dieting, feeling unsafe at school, and perpetration of violent delinquency). Separate analyses by sex were prespecified. Sexual harassment victimization was common among boys (42.4%) and girls (44.1%) in grade 9, with girls reporting more sexual jokes, comments, and unwanted touch than among boys, and with boys reporting more homosexual slurs or receiving unwanted sexual content. For girls, sexual harassment victimization in grade 9 was associated with elevated risk of self-harm, suicidal thoughts, maladaptive dieting, early dating, substance use, and feeling unsafe at school. A similar pattern of risk was found for boys, with the exception of dieting and self-harm behaviors. Adjusted odds ratios (AOR) indicated these students were significantly more likely than nonharassed students to report victimization by peers and dating partners 2.5 years later (AOR for boys and girls, respectively; all p harassment (AOR: 2.45; 2.9), physical dating violence (AOR: 2.02; 3.73), and physical peer violence (AOR: 2.75; 2.79). Gr 9 sexual harassment also contributed significantly to emotional distress (AOR: 2.09; 2.24), problem substance use (AOR: 1.79; 2.04), and violent delinquency perpetration (AOR: 2.1; 3.34) 2.5 years later (boys and girls, respectively; all p harassment at the beginning of high school is a strong predictor of future victimization by peers and dating partners for both girls and boys, and

  4. Nuclear tests: the late indemnification of victims; Essais nucleaire: l'indemnisation tardive des victimes

    Energy Technology Data Exchange (ETDEWEB)

    Charbonneau, S. [Bordeaux-1 Univ., 33 (France)

    2010-04-15

    The author briefly recalls the historical context of the creation of the CEA and outlines the silence and denial about the radioactive contamination of military personnel during the nuclear tests performed in the Algerian Sahara and in Polynesia. He also outlines the continuous action of the association of veterans and victims of these nuclear tests which gathered proofs of health consequences. He comments the content and scope of application of laws which have been lately adopted (in 2010) to acknowledge these facts and indemnify the victims

  5. Pension fund regulation: Unintended consequences of foreign investment restrictions in an emerging market economy

    Directory of Open Access Journals (Sweden)

    Coert Frederik Erasmus

    2016-12-01

    Full Text Available Retirement savings allow investors to earn income after retirement by saving while being part of the workforce. Retirement savings comprise the largest portion of retirement savings and should be safeguarded by effective regulation. To safeguard retirement savings, exposure to foreign asset investments is limited. However, in an emerging economy, limiting foreign asset investments, especially investment in developed markets, could hamper the potential investment returns due to the translation risk. To assess the effect of translation risk, a preservation provident fund was used in the present study to determine whether the returns of this preservation provident fund would be adversely affected by investment allocation regulation. The findings indicated how the translation effect affected the preservation provident fund, illustrating the adverse unintended consequences of investment regulation in emerging market economies. Consequently, regulators should reconsider the maximum allowed foreign asset investment in pension fund regulations to enhance investment returns from foreign asset investments

  6. Hedge Fund Contagion and Liquidity

    OpenAIRE

    Nicole M. Boyson; Christof W. Stahel; Rene M. Stulz

    2008-01-01

    Using hedge fund indices representing eight different styles, we find strong evidence of contagion within the hedge fund sector: controlling for a number of risk factors, the average probability that a hedge fund style index has extreme poor performance (lower 10% tail) increases from 2% to 21% as the number of other hedge fund style indices with extreme poor performance increases from zero to seven. We investigate how changes in funding and asset liquidity intensify this contagion, and find ...

  7. Natural Resource Damages Settlement Projects at the Fernald Preserve - 12316

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Jane [Fernald Preserve Site Manager, DOE Office of Legacy Management, Harrison, Ohio (United States); Schneider, Tom [Fernald Project Manager, Ohio Environmental Protection Agency, Dayton, Ohio (United States); Hertel, Bill [Project Manager, S.M. Stoller Corporation, Harrison, Ohio (United States); Homer, John [Environmental Scientist, S.M. Stoller Corporation, Harrison, Ohio (United States)

    2012-07-01

    This paper describes the development and implementation of two ecological restoration projects at the Fernald Preserve that are funded through a CERCLA natural resource damage settlement. The Paddys Run Tributary Project involves creation of vernal pool wetland habitat with adjacent forest restoration. The Triangle Area Project is a mesic tall-grass prairie establishment, similar to other efforts at the Fernald Preserve. The goal of the Fernald Natural Resource Trustees is to establish habitat for Ambystomatid salamander species, as well as grassland birds. Planning and implementation of on-property ecological restoration projects is one component of compensation for natural resource injury. As with the rest of the Fernald Preserve, ecological restoration has helped turn a DOE liability into a community asset. (authors)

  8. Nuclear knowledge preservation

    International Nuclear Information System (INIS)

    Bettencourt, Marcia Pires da Luz

    2009-01-01

    The nuclear technology has encouraged the world development and brought a number of benefits to society. These benefits occurred in important social sectors such as Agriculture, Industry, Health Sciences, Environmental Sciences and the production of energy. The research in the nuclear area is justified, accordingly, as an important factor for science development, technology and innovation. Despite the importance of nuclear energy, there is a collapse in the generation, transmission and sharing of nuclear knowledge. The threat of regression in this area is evidenced by the difficulty of generating new knowledge and practices regarding the maintenance of some critical areas. This project focuses its attention on studying, specifically, the lack of young engineers and technical professionals to replace the older, considered this, an alarming situation. Therefore, it is necessary to identify and record the key skills of experienced workers, through a set of tools to elicitation (capture) this knowledge, as expertise is mainly with people, and is lost when they leave the organization. Against, the Knowledge Management provides methodologies for the process of stimulating the creation, collection and knowledge dissemination process, in order to achieve strategic objectives. This study aims to contribute to the building of a model for the Brazilian nuclear knowledge preservation and, therefore, contributes to the maintenance and innovation of activities in this area. (author)

  9. Bullying among schoolchildren: differences between victims and aggressors.

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; Espelt, Albert; Nebot Adell, Manel

    2013-01-01

    To identify the factors associated with bullying behaviors among adolescents by analyzing victims, aggressors and victims/aggressors separately. A cross-sectional study was performed in a representative sample of 3,089 secondary school students (13-18 years old) in Barcelona (Spain). To define bullying behaviors, we used three questions about different types of mistreatment (jeering, attacking, marginalizing). Compared with secondary school students not involved in bullying, victims, aggressors and victims/aggressors were more likely to be boys and to report negative mood states. Victims were younger, were more overweight or obese and were lighter cannabis users, while aggressors were also younger but reported more antisocial behaviors and more cannabis and alcohol use. Victims/aggressors reported more antisocial behaviors and were overweight. Being involved in bullying, independently of the role adopted, was associated with health-related problems, which can lead to psychological disorders in adulthood. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  10. The impact of criminal justice involvement on victims' mental health.

    Science.gov (United States)

    Parsons, Jim; Bergin, Tiffany

    2010-04-01

    The aftermath of violent crime can leave victims with persistent emotional and mental health problems. Although research has shown the potential benefits of prosecuting cases through the courts, there is also a substantial literature that suggests that common features of the criminal justice system can exacerbate the impact of the initial crime, leading to a secondary victimization. The authors present a review of the research on the positive and negative impact of criminal justice involvement, and common points of failure in the efforts of justice institutions to meet the needs of victims. They conclude with recommendations for future work, including the need for research on restorative justice, victim impact statements, court notification systems, victim services, and victim advocates.

  11. Identifying victims of violence using register-based data

    DEFF Research Database (Denmark)

    Kruse, Marie; Sørensen, Jan; Brønnum-Hansen, Henrik

    2010-01-01

    AIMS: The aim of this study was twofold. Firstly we identified victims of violence in national registers and discussed strengths and weaknesses of this approach. Secondly we assessed the magnitude of violence and the characteristics of the victims using register-based data. METHODS: We used three...... nationwide registers to identify victims of violence: The National Patient Register, the Victim Statistics, and the Causes of Death Register. We merged these data and assessed the degree of overlap between data sources. We identified a reference population by selecting all individuals in Denmark over 15....... RESULTS: In 2006, 22,000 individuals were registered as having been exposed to violence. About 70% of these victims were men. Most victims were identified from emergency room contacts and police records, and few from the Causes of Death Register. There was some overlap between the two large data sources...

  12. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    Directory of Open Access Journals (Sweden)

    Monika Mushevska

    2016-01-01

    Full Text Available The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of age, which are victims of different kinds of crime or witnesses of different kinds of crime, in spite of the role that they have in the crime act. In all proceedings that directly or indirectly child victims involved it is important to act in a way that is the best and most appropriate for the child.

  13. Funding Ammunition Ports

    Science.gov (United States)

    2012-01-01

    a pure version of either approach, but MOTSU has a greater relative emphasis on working capital funding than MOTCO does. Figure 1.1 depicts how...midnight on September 30, the government’s coach turns into a pumpkin . That is the moment—at the end of the fiscal year—at which every agency, with a few

  14. Trading fund opportunities

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    The paper concerns the operation of the United Kingdom Atomic Energy Authority (UKAEA) as a trading fund. The changes and anticipated effects of this role are discussed, including the financial arrangements, UKAEA skills, customers, Department of Energy sponsorship and new business opportunities. (U.K.)

  15. Higher Education Funding Formulas.

    Science.gov (United States)

    McKeown-Moak, Mary P.

    1999-01-01

    One of the most critical components of the college or university chief financial officer's job is budget planning, especially using formulas. A discussion of funding formulas looks at advantages, disadvantages, and types of formulas used by states in budgeting for higher education, and examines how chief financial officers can position the campus…

  16. Colombian oil fund

    International Nuclear Information System (INIS)

    Tellez, Mauricio

    2005-01-01

    The first venture capital fund in Colombia to boost exploration and production in minor fields was launched in July. The superintendence of securities says that it is paramount for corporate development and requests duplication of the scheme in other economic sectors

  17. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  18. Domestic violence and the impact on its victims

    OpenAIRE

    Kirejevová, Iva

    2010-01-01

    Domestic violence is one of the essential problems of our society. Domestic violence is determined by high prevalence, enormous latency and great victimization impact. The aim of my thesis is to describe the psychological aspects of the victims of domestic violence. I presume that long-term psychological and physical violence has a crucial influence on the psycho-somatic health of the victim. I am aware of the fact that this problem does not concern only battered women. Nevertheless I want to...

  19. Preserving urban objects of historicaland architectural heritage

    Directory of Open Access Journals (Sweden)

    Bal'zannikova Ekaterina Mikhailovna

    2014-01-01

    Full Text Available Large cities of central Russia were built under the influence of the factors that played an important role in protecting their population; natural resources and opportunities for trading were also essential. The industrial development and construction of large industrial facilities were significant for the formation of urban environment. As a result architectural monuments of great historical value that have a significant influence on the formation of the modern city image were preserved.Nowadays, a great number of buildings of historical and architectural heritage turned out to be in poor condition. Funding and its efficient use are rational means of saving the most valuable objects of historical and cultural heritage. In order to do this it is necessary to solve the problems of developing complex and effective measures for preserving these objectsThe existing method of preserving urban objects does not focus on urban architectural objects of historical and architectural value. It does not cover the study of urban development features in architectural and town-planning environment surrounding this object, it does not determine the historical and architectural value of the object and it does not identify the relationship of the object and the surrounding objects as well as architectural frame of the total area. That is why the existing method cannot be considered an appropriate system for preserving the objects of historical and architectural heritage.In order to avoid the disadvantages mentioned above and to increase tourist interest to the architecturally valuable buildings in urban areas, the author has proposed a complex approach to improve the method of reconstructing urban objects of great historical and architectural significance.The existing method of preserving historical objects includes the preparatory period of studying the degree of historical and architectural heritage wear and decay, developing the techniques for strengthening

  20. User Experience and Heritage Preservation

    Science.gov (United States)

    Orfield, Steven J.; Chapman, J. Wesley; Davis, Nathan

    2011-01-01

    In considering the heritage preservation of higher education campus buildings, much of the attention gravitates toward issues of selection, cost, accuracy, and value, but the model for most preservation projects does not have a clear method of achieving the best solutions for meeting these targets. Instead, it simply relies on the design team and…

  1. A Latent Class Analysis of Victimization among Middle and High School Students in California

    Science.gov (United States)

    Berkowitz, Ruth; De Pedro, Kris Tunac; Gilreath, Tamika D.

    2015-01-01

    School victimization is associated with negative social-emotional outcomes and risky behaviors. Most studies have provided definitions and measures of victimization, depicting a limited characterization of victimization in schools. More nuanced analyses of school victimization are needed to assess the heterogeneous pattern of victimization in…

  2. Contact dermatitis caused by preservatives.

    Science.gov (United States)

    Yim, Elizabeth; Baquerizo Nole, Katherine L; Tosti, Antonella

    2014-01-01

    Preservatives are biocidal chemicals added to food, cosmetics, and industrial products to prevent the growth of microorganisms. They are usually nontoxic and inexpensive and have a long shelf life. Unfortunately, they commonly cause contact dermatitis. This article reviews the most important classes of preservatives physicians are most likely to encounter in their daily practice, specifically isothiazolinones, formaldehyde and formaldehyde-releasers, iodopropynyl butylcarbamate, methyldibromoglutaronitrile, and parabens. For each preservative mentioned, the prevalence of sensitization, clinical presentation of contact dermatitis, patch testing concentrations, cross reactions, and related legislation will be discussed. Mandatory labeling of preservatives is required in some countries, but not required in others. Until policies are made, physicians and patients must be proactive in identifying potential sensitizers and removing their use. We hope that this article will serve as a guide for policy makers in creating legislation and future regulations on the use and concentration of certain preservatives in cosmetics and industrial products.

  3. Victimisation and poverty: About victims and victimised in Serbia

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2014-01-01

    Full Text Available This paper is a theoretical analysis of the scientific and public discourse of victimization on the example of Serbia. The analysis has two objectives: to review the justification for the use of the concept of victim defined in the traditional way - within the legal framework; and in relation to this, to offer a different view on victimization. The process of becoming a victim is recognized as a social construct, created as a result of negotiations between the (non- formal social structure: institutions, the media, and the audience - those who stand aside, criminals and victims. In the process, some of the victims are assigned a status of justified, while others are sacrificed. There are rearely true parallels between them. Thus, unlike justified, whose suffering is perceived by public and political structures as a cause for the introduction of penal populism, the sacrificed rarely encounter any empathy. Even when they are victimized by conventional crime, the victims do not have the power to mobilize the public in a loud protest and call for change in legal practice. In the final score, it seems that the role victims are assigned largely depend of their social scale position.

  4. Victims of educator-targeted bullying: a qualitative study

    Directory of Open Access Journals (Sweden)

    Corene de Wet

    2010-01-01

    Full Text Available I report on findings emanating from in-depth personal interviews with victims of educator-targeted bullying (ETB. Qualitative content analysis was used to analyse the narratives. The findings indicate that the victims of ETB were exposed repeatedly over time to verbal, non-verbal, psychological, and physical abuse during and after school hours. ETB had a negative influence on the victims' private lives, as well as on teaching and on learning. Lastly, I found that ETB may lead to a breakdown of relations between victims and the bullies' parents and the members of the community in which schools are situated.

  5. Commentary (Victim Participation in the International Criminal Court)

    DEFF Research Database (Denmark)

    Marchuk, Iryna

    2014-01-01

    Victim participation is one of the most innovative aspects introduced in the legal framework of the International Criminal Court (hereinafter – ICC), which has not featured in the practices of other international criminal courts and tribunals. The approach of the ad hoc tribunals to victims...... was very ‘consumer like’ because victims were solely used as witnesses to testify about the crimes attributed to the accused, but they were not granted broad participatory rights in the proceedings. The drafters of the Rome Statute acknowledged wide-ranging interests of victims who, apart from seeking...

  6. Modeling the mental health effects of victimization among homeless persons

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F.; Pollio, David

    2014-01-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults. PMID:18703266

  7. Modeling the mental health effects of victimization among homeless persons.

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F; Pollio, David

    2008-11-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults.

  8. How older persons explain why they became victims of abuse

    DEFF Research Database (Denmark)

    Mysyuk, Yuliya; Westendorp, Rudi Gerardus Johannes; Lindenberg, Jolanda

    2016-01-01

    independently, in residential care facilities and nursing homes. SUBJECTS: six males and 11 females aged 63-90 years. RESULTS: the main causes of abuse identified by older victims themselves were mutual dependency between victim and perpetrator, power and control imbalances, loneliness and a marginalised social...... with the perpetrator. Coping strategies mentioned by victims were seeking informal or professional help and using self-help strategies. CONCLUSION: older victims perceive abuse differently depending on the expected acceptability of the type(s) of abuse experienced and the anticipated stigma associated...

  9. Muslim women and foreign prostitutes: victim discourse, subjectivity, and governance.

    Science.gov (United States)

    Jacobsen, Christine M; Stenvoll, Dag

    2010-01-01

    In this article, we juxtapose the ways “Muslim women” and “foreign prostitutes” are commonly constituted as victims in media and politics. We analyze the functions of these two prototypical female victims in terms of the role they play in epitomizing “the problems of globalization” and in reinforcing the existing social and political structures. Victim discourse, when tied to the transnational proliferation of the sex industry and of (radical) Islam, has depoliticizing effects because it places nonindividual causes of victimization outside of “our” polity and society and casts the state as protector and neutral arbiter of national and global inequalities, marginalization, and social conflict.

  10. Coping and Sexual Harassment: How Victims Cope across Multiple Settings.

    Science.gov (United States)

    Scarduzio, Jennifer A; Sheff, Sarah E; Smith, Mathew

    2018-02-01

    The ways sexual harassment occurs both online and in face-to-face settings has become more complicated. Sexual harassment that occurs in cyberspace or online sexual harassment adds complexity to the experiences of victims, current research understandings, and the legal dimensions of this phenomenon. Social networking sites (SNS) are a type of social media that offer unique opportunities to users and sometimes the communication that occurs on SNS can cross the line from flirtation into online sexual harassment. Victims of sexual harassment employ communicative strategies such as coping to make sense of their experiences of sexual harassment. The current study qualitatively examined problem-focused, active emotion-focused, and passive emotion-focused coping strategies employed by sexual harassment victims across multiple settings. We conducted 26 in-depth interviews with victims that had experienced sexual harassment across multiple settings (e.g., face-to-face and SNS). The findings present 16 types of coping strategies-five problem-focused, five active emotion-focused, and six passive emotion-focused. The victims used an average of three types of coping strategies during their experiences. Theoretical implications extend research on passive emotion-focused coping strategies by discussing powerlessness and how victims blame other victims. Furthermore, theoretically the findings reveal that coping is a complex, cyclical process and that victims shift among types of coping strategies over the course of their experience. Practical implications are offered for victims and for SNS sites.

  11. Funding in Spain

    International Nuclear Information System (INIS)

    Santiago, Juan Luis

    2006-01-01

    Decommissioning strategies currently considered are: Immediate dismantling (for all LWR), Deferred dismantling (only for Vandellos-I). Dismantling is assumed to commence 3 years after shutdown. End point: Release the site for industrial uses without radiological restrictions. Considerations for Planning and Funding: 40 years of lifetime for the nuclear power plants currently in operation (7.6 GWe installed). Decommissioning of NPPs: Vandellos I (Partial dismantling (Level 2) in 2003, Total dismantling (Level 3) after a 30 years period); Rest of NPPs: Total dismantling (Level 3), as regards calculation and planning 3 years after final reactor shutdown. Distribution of Responsibilities: Decommissioning is planned to start about 3 years after plant shutdown. During this period the Utility is still responsible for the plant and should remove the spent fuel and condition all the operational wastes, prior to the transfer of responsibility to Enresa. After transfer, Enresa is fully responsible for decommissioning. Decommissioning Funding and Management Rules: The cost of the decommissioning of nuclear installations are financed by the producers of such wastes. The financing of these responsibilities is by way of a Fund set up for this purpose. The costs are calculated by Enresa by means of an annual study, which reviews the status of the techniques and assesses the associated costs, this study being submitted in the General Radioactive Waste Plan to the Ministry of Economy for its approval. The Fund, managed by Enresa, is raised by a charge on the electricity price. The accumulated fund is administrated by Enresa under the supervision of the competent governmental authorities. Rules are established by a Fund Control Committee reporting to the Ministry of Economy. Financing via electricity Billing: The costs of activities arising as a result of radioactive waste management are to be financed by the producers. For NPPs, Establishment of a percentage quota on electricity

  12. Listening to victims: use of a Critical Incident Reporting System to enable adult victims of childhood sexual abuse to participate in a political reappraisal process in Germany.

    Science.gov (United States)

    Rassenhofer, Miriam; Spröber, Nina; Schneider, Thekla; Fegert, Jörg M

    2013-09-01

    Recent revelations about the scope and severity of past child sexual abuse in German institutions set off a broad public debate on this issue, and led to the establishment of a politically appointed Round Table committee and an Independent Commissioner whose mandates were to reappraise the issue and develop recommendations for future policies. A media campaign was launched to publicize the establishment of a Critical Incident Reporting System (CIRS) whereby now-adult victims of past abuse could anonymously provide testimonials and let policy makers know what issues were important to them. Respondents could either call a hotline number or communicate by mail or email. The information collected was documented and analyzed by a research team, and the results of interim reports were included in the recommendations of the Independent Commissioner and the Round Table committee. Most of the respondents described severe and repeated occurrences of childhood sexual abuse. For many, priorities were improvements in therapy and counseling services, the abolishment of the statute of limitations on prosecuting offenders, and financial compensation. Based on the recommendations of the Round Table and the Independent Commissioner, two new laws were adopted as well as an action plan and some guidelines. In addition to rules for recompensation of victims in an institutional context a fund for victims of sexual abuse in intrafamilial context was established by the Federal Government. Another effect of this process was raising societal sensitivity to the problem of child sexual abuse. The use of a CIRS enabled those directly affected by childhood sexual abuse to have some input into a political process designed to address this issue. Such an approach could have applicability in other countries or in other domains of public health and other forms of societal conflict as well. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. The Joint Development of Traditional Bullying and Victimization with Cyber Bullying and Victimization in Adolescence

    Science.gov (United States)

    Jose, Paul E.; Kljakovic, Moja; Scheib, Emma; Notter, Olivia

    2012-01-01

    The present study investigated the stabilities of and interrelationships among traditional (i.e., face-to-face) bullying, traditional victimhood, cyber bullying, and cyber victimhood among adolescents over time. About 1,700 adolescents aged 11-16 years at Time 1 self-reported levels of both bullying and victimization in four contexts (in school,…

  14. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully

  15. Latent classes of childhood poly-victimization and associations with suicidal behavior among adult trauma victims: Moderating role of anger.

    Science.gov (United States)

    Charak, Ruby; Byllesby, Brianna M; Roley, Michelle E; Claycomb, Meredith A; Durham, Tory A; Ross, Jana; Armour, Cherie; Elhai, Jon D

    2016-12-01

    The aims of the present study were first to identify discrete patterns of childhood victimization experiences including crime, child maltreatment, peer/sibling victimization, sexual violence, and witnessing violence among adult trauma victims using latent class analysis; second, to examine the association between class-membership and suicidal behavior, and third to investigate the differential role of dispositional anger on the association between class-membership and suicidal behavior. We hypothesized that those classes with accumulating exposure to different types of childhood victimization (e.g., poly-victimization) would endorse higher suicidal behavior, than the other less severe classes, and those in the most severe class with higher anger trait would have stronger association with suicidal behavior. Respondents were 346 adults (N=346; M age =35.0years; 55.9% female) who had experienced a lifetime traumatic event. Sixty four percent had experienced poly-victimization (four or more victimization experiences) and 38.8% met the cut-off score for suicidal behavior. Three distinct classes emerged namely, the Least victimization (Class 1), the Predominantly crime and sibling/peer victimization (Class 2), and the Poly-victimization (Class 3) classes. Regression analysis controlling for age and gender indicated that only the main effect of anger was significantly associated with suicidal behavior. The interaction term suggested that those in the Poly-victimization class were higher on suicidal behavior as a result of a stronger association between anger and suicidal behavior in contrast to the association found in Class 2. Clinical implications of findings entail imparting anger management skills to facilitate wellbeing among adult with childhood poly-victimization experiences. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Attitudes toward victim and victimization in the light of the just world theory

    Directory of Open Access Journals (Sweden)

    Simeunović-Patić Biljana

    2017-01-01

    Full Text Available The present paper discusses current empirical status of the Just world theory introduced several decades ago by Melvin Lerner, the content and functions of a just world belief as its central construct, and particularly, the relation between a just world belief and victim blaming and victim derogation phenomena. In the light of existing research evidence, a just world belief and a need to re-establish a “justice” when this belief is threatened, is considered to be an adaptive mechanism that protect a belief that a world is secure and the future is predictable, as well as a confidence in the purposefulness of selfdiscipline, long-term personal investments and social rules respecting. As proposed By the just world theory, when a person faces injustice, i.e. others’ (innocent victims’ suffering, his/her belief in a just world is threatened. Possible reactions to that threat comprise various rational victim helping activities, but also specific cognitive defensive strategies, including cognitive distortion, rationalization and reinterpretation of an event in order to minimize injustice or deny injustice happened at all. In the course of reinterpretation of injustice, victims are often blamed for their former actions, or derogated for their character, in order to indicate them responsible for their own fate and suffering. The findings of research studies suggest that the likelihood of employing cognitive defensive strategies rises if formal responses to crime and victimization lack or fail. This further suggests that an efficient and effective formal social response in terms of both sanctioning of offenders and reparation of victims should be considered highly important in reducing the risk of stigmatization and rejection of victims. Finally, the paper discusses the role of victim’s just world beliefs in post-trauma adaptation and coping processes. In virtue of findings from the existing research literature it may be concluded that victim

  17. [From acute victimization at chronic victimization: socio-cognitive approach of differential tolerance threshold].

    Science.gov (United States)

    Forte, M; Przygodzki-Lionet, N; Masclet, G

    2006-01-01

    Work, for many years reduced to a purely instrumental dimension, proves to be a true microcosm of society, with its informal modes, its emotional networks and its series of evils and dilemmas. This human apprehension of the professional sphere tends to reveal a pole with multiple facets, some of which have long been concealed, but whose individual, social and economic extent can't let people ignore them. This social perception, which contributes to regard work as sacred and makes it impervious to any aggression, should be abandoned. Bearing this in mind, our study endeavours to show that "work" and "victim" are far more overlapping than antagonistic realities; it aims at determining the impact of two aggressive methods via the professional pole, namely: moral harassment at work and armed attacks within bank premises. Such an approach tends to unify health psychology, occupational psychology and victimology, thus opening a breach in the stereotyped view which crystallizes the professional sphere into a kind of representative noose devoid of the most human bases. We then suggest, as a first hypothesis, that the nature of the victimization process, resulting from specific aggressive scenarios, would determine different psychological, physiological and relational consequences, apprehended under the generic expression of tolerance threshold. In other words, "mobbing", through its proactive, intentional and obsessional dimension would tend to lower the victims' threshold more than hold-ups, which are characterized by a reactive aspect, and obey unfavourable socio-economic contingencies. Our research also aims at apprehending this dynamic relationship binding victimization types to tolerance thresholds through two analysing factors. These psychological mediators are derived from Lazarus and Folkman's "transactional model of stress", which postulates that stress would rise from the perception people get of the transaction between the requirements of the situation and their

  18. Program development fund

    International Nuclear Information System (INIS)

    1989-03-01

    It is the objective of the Fund to encourage innovative research to maintain the Laboratory's position at the forefront of science. Funds are used to explore new ideas and concepts that may potentially develop into new directions of research for the Laboratory and that are consistent with the major needs, overall goals, and mission of the Laboratory and the DOE. The types of projects eligible for support from PDF include: work in forefront areas of science and technology for the primary purpose of enriching Laboratory research and development capabilities; advanced study of new hypotheses, new experimental concepts, or innovative approaches to energy problems; experiments directed toward ''proof of principle'' or early determination of the utility of a new concept; and conception, design analyses, and development of experimental devices, instruments, or components. This report is a review of these research programs

  19. Pension Fund award

    CERN Multimedia

    Antonella Del Rosso

    2013-01-01

    The CERN Pension Fund won the Investments & Pensions Europe (IPE) 2013 Gold Award in the Medium Real-Estate Investor category. IPE is the leading European publication on the subject of pensions. The awards were judged by a panel of 22 members, which included leading European investment consultants and pension fund executives.     Théodore Economou (left), the CERN Pension Fund’s Chief Executive Officer, receives the IPE 2013 Gold Award.   The award recognised the “fresh thinking” behind the CERN Pension Fund’s updated real-estate strategy, which has brought it “focus” on “high-quality assets and diversification.” The jury also noted the Fund’s “streamlined and cost-efficient” management, and noted that CERN is “running a tight ship”. While the awards are given by a European institution, they have a worldwide scope, and winners in ot...

  20. Kryolize - KT Fund Project

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Safety standards and best practices do exist in the field of cryogenics but, as in most domains, they are generally inserted in a few ‘envelope’ cases commonly used in the industry, whereas applicability to the particularity of research facilities are not fully tailored to its needs. The main objective in these cases is to find a harmonised approach, based on lessons learnt and scientific knowledge. The Kryolize Project was created in order to produce tools with a harmonized approach to size pressure relief devices for cryogenic applications. In view of disseminating such tools to other institutes and industrial partners, the project was submitted to CERN’s KT Fund committee. This talk will focus on the process and deliverables of the KT-Funded Kryolize project, including the method on how to cope with the sizing of pressure relief devices and the R&D collaboration agreement between CERN and Karlsruhe Institute of Technology for an experimental programme.

  1. A cause worth funding

    CERN Multimedia

    1999-01-01

    Germany is considering giving a fully functioning synchrotron radiation source for use by scientists in the Middle East. It will be the focus of a broader centre for research excellence for scientists from that region and the rest of the world. The proposal however needs substantial funding, potential backers include the EU, the US government as well as states within the Middle East. The issue will be discussed at the World Conference on Science in Budapest (1/2 page).

  2. Predictors of Latent Trajectory Classes of Dating Violence Victimization

    Science.gov (United States)

    Brooks-Russell, Ashley; Foshee, Vangie; Ennett, Susan

    2014-01-01

    This study identified classes of developmental trajectories of physical dating violence victimization from grades 8 to 12 and examined theoretically-based risk factors that distinguished among trajectory classes. Data were from a multi-wave longitudinal study spanning 8th through 12th grade (n = 2,566; 51.9% female). Growth mixture models were used to identify trajectory classes of physical dating violence victimization separately for girls and boys. Logistic and multinomial logistic regressions were used to identify situational and target vulnerability factors associated with the trajectory classes. For girls, three trajectory classes were identified: a low/non-involved class; a moderate class where victimization increased slightly until the 10th grade and then decreased through the 12th grade; and a high class where victimization started at a higher level in the 8th grade, increased substantially until the 10th grade, and then decreased until the 12th grade. For males, two classes were identified: a low/non-involved class, and a victimized class where victimization increased slightly until the 9th grade, decreased until the 11th grade, and then increased again through the 12th grade. In bivariate analyses, almost all of the situational and target vulnerability risk factors distinguished the victimization classes from the non-involved classes. However, when all risk factors and control variables were in the model, alcohol use (a situational vulnerability) was the only factor that distinguished membership in the moderate trajectory class from the non-involved class for girls; anxiety and being victimized by peers (target vulnerability factors) were the factors that distinguished the high from the non-involved classes for the girls; and victimization by peers was the only factor distinguishing the victimized from the non-involved class for boys. These findings contribute to our understanding of the heterogeneity in physical dating violence victimization during

  3. Food preservation by irradiation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1978-02-15

    As shortages of food and energy still continue to constitute the major threats to the well-being of the human race, all actions aiming at overcoming these problems must be assigned vital importance. Of the two complementary ways of solving the food problem (i.e., increasing the production of food and decreasing the spoilage of food) a novel method designed to contribute to the latter purpose has been discussed at this symposium hosted by The Netherlands and held under the aegis of the Food and Agriculture Organization of the United Nations, the International Atomic Energy Agency and the World Health Organization. Progress made since the last symposium of this kind (Bombay, India, 1972) was reviewed from the technological, economic and wholesomeness points of view by participants from 39 countries (60% of the latter were of the developing world). From the reports presented on the use of radiations to control physiological changes in plants, feasibility of radiation preservation of potatoes, onions, garlic, as well as of some tropical and subtropical fruits (mangoes, papayas, litchis and avocado) was confirmed. For potatoes, onions and mangoes, optimal conditions of treatment and storage were established on a larger scale, combined with sizeable consumer trials. Combinations of ionizing radiation with chemicals (salycilic acid, for potatoes), and physical agents (ultraviolet rays, for papayas) have been reported to be successful against the incidence of rot. A considerable number of papers dealt with the control of microbiological spoilage of foods. Work since 1972 has shown that radurization of fruits and vegetables (bananas, mangoes, dried dates, endive, chickory, onions, soup-greens), meat, poultry, marine products (mackerel, cod and plaice fillets, shrimps), decontamination of food ingredients and food technology aids (enzyme preparations, proteins, starch, spices), radappertization of meat and animal feedstuffs as well as combination treatments with salt, heat

  4. Food preservation by irradiation

    International Nuclear Information System (INIS)

    1978-01-01

    As shortages of food and energy still continue to constitute the major threats to the well-being of the human race, all actions aiming at overcoming these problems must be assigned vital importance. Of the two complementary ways of solving the food problem (i.e., increasing the production of food and decreasing the spoilage of food) a novel method designed to contribute to the latter purpose has been discussed at this symposium hosted by The Netherlands and held under the aegis of the Food and Agriculture Organization of the United Nations, the International Atomic Energy Agency and the World Health Organization. Progress made since the last symposium of this kind (Bombay, India, 1972) was reviewed from the technological, economic and wholesomeness points of view by participants from 39 countries (60% of the latter were of the developing world). From the reports presented on the use of radiations to control physiological changes in plants, feasibility of radiation preservation of potatoes, onions, garlic, as well as of some tropical and subtropical fruits (mangoes, papayas, litchis and avocado) was confirmed. For potatoes, onions and mangoes, optimal conditions of treatment and storage were established on a larger scale, combined with sizeable consumer trials. Combinations of ionizing radiation with chemicals (salycilic acid, for potatoes), and physical agents (ultraviolet rays, for papayas) have been reported to be successful against the incidence of rot. A considerable number of papers dealt with the control of microbiological spoilage of foods. Work since 1972 has shown that radurization of fruits and vegetables (bananas, mangoes, dried dates, endive, chickory, onions, soup-greens), meat, poultry, marine products (mackerel, cod and plaice fillets, shrimps), decontamination of food ingredients and food technology aids (enzyme preparations, proteins, starch, spices), radappertization of meat and animal feedstuffs as well as combination treatments with salt, heat

  5. Pension Fund Governing Board

    CERN Multimedia

    HR Department

    2008-01-01

    Note The CERN pension scheme is based on the principle of defined benefits, so beneficiaries continue to receive the benefits to which they are entitled in accordance with the Rules of the Pension Fund. This means that pension entitlements under the Rules are not directly affected by the financial crisis and the current economic situation. However, the adjustment of pensions to the cost of living is not automatic and, under the method applied since 2006, must take into account the Fund’s financial position. Meeting of the Pension Fund Governing Board The Pension Fund Governing Board held its eighth meeting at ESO in Garching (near Munich), Germany on 24 October 2008. Before starting its work, the Governing Board had the privilege of hearing an opening address by Professor Tim de Zeeuw, the Director General of ESO. Professor de Zeeuw described the mission of ESO and the ambitious projects of his organisation, which performs astronomy observations using telescopes located in Chile. The Director-General receiv...

  6. PENSION FUND - ELECTIONS

    CERN Multimedia

    2000-01-01

    This candidature has been duly registered and is hereby presented in accordance with paragraph 6.h of the Regulations for Elections to the Governing Board of the Pension Fund.   Candidate: Name: MAURIN First Name: Guy I have been a member of the personnel since 1967 and as early as 1972 I was involved, in my capacity as President of the Staff Association, in the improvement of the Pension Fund benefits. As for most of us the Pension Fund is the only social provident scheme to which we belong, it is important to ensure that it is well managed and in balance. As a member of the Governing Board since 1974 and Vice-Chairman of this Board since 1977, I have continued to pursue these objectives. One of the main responsibilities of the Governing Board is our asset investment policy. The Investment Committee, of which I am Chairman, must have an overall view of the management of our 4 billion Swiss francs and seek the best yield with minimum risk. The investment structure must continuously be adapted i...

  7. Trajectories of Intimate Partner Violence Victimization

    Directory of Open Access Journals (Sweden)

    Kevin M. Swartout

    2012-08-01

    Full Text Available Introduction: The purposes of this study were to assess the extent to which latent trajectories of female intimate partner violence (IPV victimization exist; and, if so, use negative childhood experiences to predict trajectory membership.Methods: We collected data from 1,575 women at 5 time-points regarding experiences during adolescence and their 4 years of college. We used latent class growth analysis to fit a series of personcentered, longitudinal models ranging from 1 to 5 trajectories. Once the best-fitting model was selected, we used negative childhood experience variables—sexual abuse, physical abuse, and witnessing domestic violence—to predict most-likely trajectory membership via multinomial logistic regression.Results: A 5-trajectory model best fit the data both statistically and in terms of interpretability. The trajectories across time were interpreted as low or no IPV, low to moderate IPV, moderate to low IPV, high to moderate IPV, and high and increasing IPV, respectively. Negative childhood experiences differentiated trajectory membership, somewhat, with childhood sexual abuse as a consistent predictor of membership in elevated IPV trajectories.Conclusion: Our analyses show how IPV risk changes over time and in different ways. These differential patterns of IPV suggest the need for prevention strategies tailored for women that consider victimization experiences in childhood and early adulthood. [West J Emerg Med. 2012;13(3:272–277.

  8. Women in alcoholic partnerships: Victimized and stigmatized

    Directory of Open Access Journals (Sweden)

    Dragišić-Labaš Slađana

    2016-01-01

    Full Text Available In this paper we strived to examine and therefore gain a deeper insight into the stigmatization and victimization of women living with an alcoholic partner by taking into account various perspectives. The association between alcohol consumption and violence against women has long been recognized, but wider social and legal support and protection followed rather late. Especially in developing countries, this serious problem has become one of the biggest health issues that is nonetheless still insufficiently investigated. High rates of aggressive and violent behavior of men towards women in partnerships have deep cultural and social roots, and this is additionally enhanced by the use of alcohol. The use of alcohol enhances violence against women and is therefore often justified which is obviously unacceptable. Women are victimized regardless of the position in these type of partnerships, namely irrespective of whether they themselves or addicts or are partners of addicted partners or husbands, because they often suffer psychological, physical and sexual violence. Several case studies drawn from our practice and presented below will partly illuminate dark side of a violent alcoholic partnership. In order to better understand the link between alcohol and violence it seems necessary to consider both social and structural factors involved.

  9. Contamination versus preservation of cosmetics

    DEFF Research Database (Denmark)

    Lundov, Michael Dyrgaard; Moesby, Lise; Zachariae, Claus

    2009-01-01

    Cosmetics with high water content are at a risk of being contaminated by micro-organisms that can alter the composition of the product or pose a health risk to the consumer. Pathogenic micro-organisms such as Staphylococcus aureus and Pseudomonas aeruginosa are frequently found in contaminated...... cosmetics. In order to avoid contamination of cosmetics, the manufacturers add preservatives to their products. In the EU and the USA, cosmetics are under legislation and all preservatives must be safety evaluated by committees. There are several different preservatives available but the cosmetic market...

  10. Comparison of different skin preservation methods with gamma irradiation.

    Science.gov (United States)

    Guerrero, Linda; Camacho, Bernardo

    2017-06-01

    Allografts are in constant demand, not only for burn victims, but also for all open wounds as "biological dressings". Tissue quality and security are two of the major concerns of Tissue Banks. There are limited studies published. There has been extensive discussion on the subject of preservation methods for cadaver skin. Most literature available comes from clinical reports. In this research, the authors compared 85% glycerolized non irradiated skin allografts with three glycerolized irradiated skin allografts (using different glycerol concentrations 50%, 70% and 85%). The evaluation of allograft quality was done by measuring physical and biological properties of such prepared human tissue grafts. In the histological structure evaluation changes were minimal and did not alter the skin structure. The clinical function of their behavior as temporal dressings was tested. They proved to have similar capabilities for improving granulating tissue and contributing to wound beds closure (Hickerson et al. (1994) [1]). Copyright © 2017 Elsevier Ltd and ISBI. All rights reserved.

  11. Multiple victimization experiences of urban elementary school students: associations with psychosocial functioning and academic performance.

    Science.gov (United States)

    Holt, Melissa K; Finkelhor, David; Kantor, Glenda Kaufman

    2007-05-01

    This study explored the victimization experiences of urban elementary school students to determine whether subsets of youth emerged with similar victimization profiles (e.g., no victimization, multiple types of victimization). It also evaluated whether multiple victimization was associated with greater psychological distress and lower academic performance. Participants were 689 fifth grade students from an urban, ethnically diverse school district in the Northeast. Youth completed self-report measures in school about bullying victimization, victimization in the home and community, and psychosocial functioning. Cluster analysis suggested the existence of three distinct youth profiles: those with minimal victimization, those victimized primarily by their peers, and those with multiple types of victimizations. As hypothesized, youth with multiple victimizations experienced more psychological distress and earned lower grades than their peers. Findings highlight the heterogeneity of youth victimization experiences and their relations to functioning, and have implications for treatment planning among practitioners working with youth.

  12. Facial preservation following extreme mummification: Shrunken heads.

    Science.gov (United States)

    Houlton, Tobias M R; Wilkinson, Caroline

    2018-05-01

    Shrunken heads are a mummification phenomenon unique to South America. Ceremonial tsantsa are ritually reduced heads from enemy victims of the Shuar, Achuar, Awajún (Aguaruna), Wampís (Huambisa), and Candoshi-Shapra cultures. Commercial shrunken heads are comparatively modern and fraudulently produced for the curio-market, often using stolen bodies from hospital mortuaries and graves. To achieve shrinkage and desiccation, heads undergo skinning, simmering (in water) and drying. Considering the intensive treatments applied, this research aims to identify how the facial structure can alter and impact identification using post-mortem depiction. Sixty-five human shrunken heads were assessed: 6 ceremonial, 36 commercial, and 23 ambiguous. Investigations included manual inspection, multi-detector computerised tomography, infrared reflectography, ultraviolet fluorescence and microscopic hair analysis. The mummification process disfigures the outer face, cheeks, nasal root and bridge form, including brow ridge, eyes, ears, mouth, and nose projection. Melanin depletion, epidermal degeneration, and any applied staining changes the natural skin complexion. Papillary and reticular dermis separation is possible. Normal hair structure (cuticle, cortex, medulla) is retained. Hair appears longer (unless cut) and more profuse following shrinkage. Significant features retained include skin defects, facial creases, hairlines and earlobe form. Hair conditions that only affect living scalps are preserved (e.g. nits, hair casts). Ear and nose cartilage helps to retain some morphological information. Commercial heads appear less distorted than ceremonial tsantsa, often presenting a definable eyebrow shape, vermillion lip shape, lip thickness (if mouth is open), philtrum form, and palpebral slit angle. Facial identification capabilities are considered limited, and only perceived possible for commercial heads. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Funding Opportunity: Genomic Data Centers

    Science.gov (United States)

    Funding Opportunity CCG, Funding Opportunity Center for Cancer Genomics, CCG, Center for Cancer Genomics, CCG RFA, Center for cancer genomics rfa, genomic data analysis network, genomic data analysis network centers,

  14. Namibia - Vocational Training Grant Fund

    Data.gov (United States)

    Millennium Challenge Corporation — The impact evaluation of the Vocational Training Grant Fund (VTGF) subactivity in Namibia used a random assignment design to determine the effects of VTGF-funded...

  15. Mutual Fund Performances of Polish Domestic Equity Fund Managers

    Directory of Open Access Journals (Sweden)

    ömer faruk tan

    2015-10-01

    Full Text Available Purpose of the article: The main purpose of the paper is empirically evaluating selectivity skills and market timing ability of Polish fund managers during the period from January 2009 to November 2014. After the global financial crisis of 2008, in this period of quantitative easing (QE, thanks to an increase in the money supply, a capital flow from developed countries to developing countries was observed. In this study, we try to analyse that although the financial market in Poland made an incredible progress, whether fund managers show better or worse performance than the market. Methodology/Methods: In order to evaluate fund manager performances, Jensen alpha (1968 is computed, which depicts selectivity skills of fund managers. For determining market timing ability of fund managers, Treynor & Mazuy (1966 regression analysis and Henriksson & Merton (1981 regression analysis are applied. Fund performances are evaluated using Warsaw Stock Exchange Index as the benchmark index. Scientific aim: In this study, we have tried to evaluate selectivity skills and market timing ability of Polish fund managers. A total of 14 equity fund managers’ performances are analysed. The study can be guiding especially for investors who are interested in Polish equity fund performances in a period where emerging stock markets outperformed with quantitative easing. Findings: Jensen (1968 alphas indicate that over this period fund managers did not have selective ability, as none of the 14 funds had statistically significant positive alphas. Furthermore, Treynor & Mazuy (1966 and Henriksson & Merton (1981 regression analysis indicate that over the same period fund managers did not also have market timing ability, as again none of the 14 funds had statistically significant positive coefficients. Conclusions: In this work, we can detect that in the era of quantitative easing, although the financial market in Poland made an incredible progress, the fund returns were

  16. The criminal victimization of children and women in international perspective

    NARCIS (Netherlands)

    van Dijk, Jan; Kury, Helmut; Redo, Slawomir; Shea, Evelyn

    2016-01-01

    Abstract In this article we will present an overview of the results of the national and international crime victims surveys regarding the distribution of victimization according to age and gender with a focus on violent crime. The results show a consistent inversed relationship between age and

  17. The effect of police on crime, disorder and victim precaution

    NARCIS (Netherlands)

    Vollaard, B.A.; Koning, P.W.C.

    2009-01-01

    Using individual data from a large-scale Dutch crime victimization survey, we are able to expand the analysis of the effect of police on crime to crimes types that do not easily find their way into police statistics, and to public disorder and victim precaution. To address heterogeneity and

  18. Victimization by Bullying and Physical Symptoms among South Korean Schoolchildren

    Science.gov (United States)

    Lee, Ji Hyeon

    2018-01-01

    This study examined the relationship between victimization by bullying and physical symptoms among South Korean school children. Data were analyzed from a nationally representative sample of 2006 schoolchildren across South Korea aged 9-17 years. Multiple logistic regression analysis was used to estimate the associations between victimization by…

  19. Tracking Offenders: The Child Victim. Bureau of Justice Statistics Bulletin.

    Science.gov (United States)

    Manson, Donald A.; Sedgwick, Jeffrey L., Ed.

    This research focused on the criminal justice system's handling of offenders against children, comparing it with the processing of offenders against all victims. Data were obtained from California, New York, Ohio, Pennsylvania, Utah, and Virginia for offenses against children and against all victims in the areas of kidnapping, sexual assault,…

  20. Cyberbullying Perpetration and Victimization Among Middle-School Students

    Science.gov (United States)

    Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-01-01

    Objectives. We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. Methods. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator–victim (i.e., bidirectional cyberbullying behavior). Results. In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator–victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators–victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators–victims. Conclusions. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters. PMID:25602905

  1. Old Wine, New Bottle? Comparing Interpersonal Bullying and Cyberbullying Victimization

    Science.gov (United States)

    Payne, Allison Ann; Hutzell, Kirsten L.

    2017-01-01

    This study uses a large nationally representative sample to compare and contrast interpersonal bullying and cyberbullying by asking the following questions: (a) How does the prevalence of cyberbullying victimization compare with the prevalence of interpersonal bullying victimization? (b) How does the relationship between demographic predictors and…

  2. Cyberbullying perpetration and victimization among middle-school students.

    Science.gov (United States)

    Rice, Eric; Petering, Robin; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-03-01

    We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator-victim (i.e., bidirectional cyberbullying behavior). In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator-victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators-victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators-victims. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters.

  3. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  4. Relational Aggression, Victimization, and Language Development: Implications for Practice

    Science.gov (United States)

    Ostrov, Jamie M.; Godleski, Stephanie A.

    2007-01-01

    This review explores the development of relational aggression and relational victimization among peers, with specific emphasis on clinical implications for speech-language pathologists. Developmental manifestations of relational aggression and victimization are reviewed from early childhood through emerging adulthood. The concurrent and…

  5. Peer victimization and peer rejection during early childhood

    Science.gov (United States)

    Godleski, Stephanie A.; Kamper, Kimberly E.; Ostrov, Jamie M.; Hart, Emily J.; Blakely-McClure, Sarah J.

    2014-01-01

    Objective The development and course of the subtypes of peer victimization is a relatively understudied topic despite the association of victimization with important developmental and clinical outcomes. Moreover, understanding potential predictors, such as peer rejection and emotion regulation, in early childhood may be especially important to elucidate possible bi-directional pathways between relational and physical victimization and rejection. The current study (N = 97) was designed to explore several gaps and limitations in the peer victimization and peer rejection literature. In particular, the prospective associations between relational and physical victimization and peer rejection over the course of 3.5 months during early childhood (i.e., 3- to 5- years-old) were investigated in an integrated model. Method The study consisted of 97 (42 girls) preschool children recruited from four early childhood schools in the northeast of the US. Using observations, research assistant report and teacher report, relational and physical aggression, relational and physical victimization, peer rejection, and emotion regulation were measured in a short-term longitudinal study. Path analyses were conducted to test the overall hypothesized model. Results Peer rejection was found to predict increases in relational victimization. In addition, emotion regulation was found to predict decreases in peer rejection and physical victimization. Conclusions Implications for research and practice are discussed, including teaching coping strategies for peer rejection and emotional distress. PMID:25133659

  6. 78 FR 24319 - National Crime Victims' Rights Week, 2013

    Science.gov (United States)

    2013-04-24

    ... we know: families trying to rebuild after financial fraud or identity theft, grandparents spending... victims of abuse. We have continued to crack down on financial crimes that leave too many families..., and by volunteering to serve victims in their time of need. [[Page 24320

  7. Sexual Harassment Victims: Psycholegal and Family Therapy Considerations.

    Science.gov (United States)

    Woody, Robert Henley; Perry, Nancy Walker

    1993-01-01

    Examines legal proscriptions and practical definitions of sexual harassment, describes psychological effects of sexual harassment (Sexual Harassment Trauma Syndrome) for victim-client and impact on family system, and offers guidance for family therapy. Focuses on vulnerability of victim-client, reconstruction of self-concept as primary goal of…

  8. The Legal Duty to Incorporate Mistakes of the Victim

    NARCIS (Netherlands)

    L.T. Visscher (Louis)

    2008-01-01

    textabstractAbstract: In many jurisdictions, potential injurers are under a legal duty to incorporate possible mistakes of the potential victim. I distinguish three types of mistakes. First, victims might make mistakes because it is too costly to avoid them (e.g. little children in traffic). Second,

  9. A Latent Class Approach to Examining Forms of Peer Victimization

    Science.gov (United States)

    Bradshaw, Catherine P.; Waasdorp, Tracy E.; O'Brennan, Lindsey M.

    2013-01-01

    There is growing interest in gender differences in the experience of various forms of peer victimization; however, much of the work to date has used traditional variable-centered approaches by focusing on scales or individual forms of victimization in isolation. The current study explored whether there were discrete groups of adolescents who…

  10. Constructing victims and perpetrators of rape in the advice column

    African Journals Online (AJOL)

    Kate H

    The findings suggest that there has been a decrease in explicit victim blaming after 1994 .... functions: to accuse the woman and to excuse the man. ..... effort into getting this matter corrected,” attributing implicit blame to the victim for the assault ...

  11. Attachment Styles among Bullies, Victims and Uninvolved Adolescents

    Science.gov (United States)

    Koiv, Kristi

    2012-01-01

    Attachment theory provides a frame for understanding the role of attachment styles in the development of bullying behaviour in adolescence. The present study examined attachment styles (secure, avoidant and anxious/ambivalent) that differentiated bullies, victims, bully/victims and uninvolved adolescents. A total of 1,921 students (1,006 girls and…

  12. The incongruity of workplace bullying victimization and inclusive excellence.

    Science.gov (United States)

    Dzurec, Laura Cox; Kennison, Monica; Gillen, Patricia

    Bullying occurs frequently-and with significant negative outcomes-in workplace settings. Once established, bullying endures in the workplace, requiring the interaction of a bully perpetrator and an intended target who takes on the role of victim. Not every target becomes a victim, however. The purpose of this study is to investigate the processes by which targets, intended objects of bullies' affronts, become victims, those individuals who experience ongoing emotional injury in response to bullies' affronts, and to clarify how bullying victimization impedes inclusive excellence in the workplace. The design for this study was pragmatic utility, an inductive research approach grounded in assumptions of hermeneutics. The pragmatic utility process involved the investigators' synthesis of descriptions from a broad, interdisciplinary published literature. Integrating knowledge from their previous research and practice experiences with the pragmatic utility process, they derived qualitative features of victims' experiences, differentiating target from victim in bullying encounters. For those targets who ultimately are victimized, response to bullies' affronts extends far beyond the immediate present. Redolence of personal, lived experience revives bygone vulnerabilities, and naïve communication and relationship expectations reinforce a long-standing, impoverished sense. That sense couples with workplace dynamics to augment a context of exclusion. Findings suggest that, as Heidegger contended, we are our histories. Personal history demonstrates a significance influence on the manifestation of bullying victimization, acting to distance them from their workplace peers and to impede inclusive excellence. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. A Longitudinal Investigation of Peer Sexual Harassment Victimization in Adolescence

    Science.gov (United States)

    Petersen, Jennifer L.; Hyde, Janet Shibley

    2009-01-01

    The current study describes longitudinal trends in sexual harassment by adolescent peers and highlights gender, pubertal status, attractiveness, and power as predictors of harassment victimization. At the end of 5th, 7th, and 9th grades, 242 adolescents completed questionnaires about sexual harassment victimization, pubertal status, and perceived…

  14. The interrelation between victimization and bullying inside young offender institutions.

    Science.gov (United States)

    Häufle, Jenny; Wolter, Daniel

    2015-01-01

    Bullying and victimization are serious problems within prisons. Young Offender Institutions (YOIs), in particular, suffer from high rates of inmate-on-inmate violence. More recent theories about the development of bullying in closed custody institutions imply a relationship between the experience of victimization and the usage of bullying. In our study, we test this linkage using longitudinal survey data taken at two time-points from 473 inmates (aged 15-24) inside three YOIs in Germany. We first analyze the extent of bullying and victimization, and then used a longitudinal structural equation model to predict inmate bullying behavior at time 2 based on victimization that occurred at time 1. Age is used as a predictor variable to account for differences in the amount of victimization and bullying. Results suggest that bullying and victimization are high in the YOIs, which were subject to research. Most inmates reported being a bully and a victim at the same time. Younger inmates use more direct physical bullying but not psychological bullying. An increase in psychological bullying over time can significantly be explained by victimization at an earlier measurement time point. Our study therefore supports recent theoretical assumptions about the development of bullying behavior. Possible implications for prevention and intervention are discussed. © 2014 Wiley Periodicals, Inc.

  15. Differences in Bullying Victimization between Students with and without Disabilities

    Science.gov (United States)

    Bear, George G.; Mantz, Lindsey S.; Glutting, Joseph J.; Yang, Chunyan; Boyer, Deborah E.

    2015-01-01

    Prevalence rates for bullying victimization among children with disabilities have varied greatly in the research literature. Two reasons for such variability were the focus of this study: (a) rates vary as a function of disability type, and (b) rates vary based on the bullying measure and criteria used to classify students as bullying victims. The…

  16. Violent online games exposure and cyberbullying/victimization among adolescents.

    Science.gov (United States)

    Lam, Lawrence T; Cheng, Zaohuo; Liu, Xinmin

    2013-03-01

    This population-based cross-sectional survey examined the association between exposure to violent online games and cyberbullying and victimization in adolescents recruited from two large cities utilizing a stratified two-stage random cluster sampling technique. Cyberbullying and victimization were assessed by the E-victimization and E-bullying scales validated in a previous study. Exposure to violent online games was measured by self-nomination of the degree of violent content in the games played. Results indicated that the majority (74.3 percent) of respondents did not experience any cyberbullying or victimization in the last 7 days before the survey, 14.4 percent reported to be victimized via cyberspace, 2.9 percent admitted that they had bullied others, and 8.4 percent reported to be both perpetrators- and- victims. One hundred and eighty seven (15.3 percent) considered games they were playing were of moderate to severe violence. Students who had been involved in cyberbullying as well as being victimized were two times as likely to have been exposed to violent online games, and nearly four times as likely for those involved in bullying others. Exposure to violent online games was associated with being a perpetrator as well as a perpetrator-and-victim of cyberbullying. Parents and clinicians need to be aware of the potential harm of these exposures. The policy implications of results were also discussed.

  17. Perceptions and Correlates of Peer-Victimization and Bullying

    Science.gov (United States)

    Hunter, Simon C.; Boyle, James M. E.; Warden, David

    2007-01-01

    Background: The experiences of peer-victimization and bullying are often treated empirically as though they are conceptually indistinct. Both involve repeated aggression, but definitions of bullying additionally emphasize the importance of aggressor intent and imbalance of power between the aggressor and the victim (Olweus, 1978; Whitney &…

  18. Acculturation and Dating Violence Victimization among Filipino and Samoan Youths

    Science.gov (United States)

    Chung-Do, Jane J.; Goebert, Deborah A.

    2009-01-01

    Dating violence victimization is an important public health issue. Recent studies on minority youths have found higher risks of dating violence victimization compared to White youths. This study examined the influence of acculturation components on youths' experiences of dating violence by utilizing data from a survey of 193 Samoan and Filipino…

  19. Decommissioning funding: ethics, implementation, uncertainties

    International Nuclear Information System (INIS)

    2006-01-01

    This status report on Decommissioning Funding: Ethics, Implementation, Uncertainties also draws on the experience of the NEA Working Party on Decommissioning and Dismantling (WPDD). The report offers, in a concise form, an overview of relevant considerations on decommissioning funding mechanisms with regard to ethics, implementation and uncertainties. Underlying ethical principles found in international agreements are identified, and factors influencing the accumulation and management of funds for decommissioning nuclear facilities are discussed together with the main sources of uncertainties of funding systems. (authors)

  20. Investible benchmarks & hedge fund liquidity

    OpenAIRE

    Freed, Marc S; McMillan, Ben

    2011-01-01

    A lack of commonly accepted benchmarks for hedge fund performance has permitted hedge fund managers to attribute to skill returns that may actually accrue from market risk factors and illiquidity. Recent innovations in hedge fund replication permits us to estimate the extent of this misattribution. Using an option-based model, we find evidence that the value of liquidity options that investors implicitly grant managers when they invest may account for part or even all hedge fund returns. C...

  1. Federal Support for Preserve America

    Science.gov (United States)

    Mississippi's Heritage Tourism Industry Post Hurricane Katrina also received a $150,000 Preserve America Grant Arkansas Delta, one for music, one for African-American history, and one for agriculture. The project will

  2. Cultural Preservation Program for Alaska

    Science.gov (United States)

    Barbaran, Francisco Ramon

    2011-01-01

    In this technical report, an innovative cultural preservation program for implementation in Athabascan villages is presented. The parameters for success in implementing such a project is discussed based on a workshop with Athabascan elders.

  3. Child human trafficking victims: challenges for the child welfare system.

    Science.gov (United States)

    Fong, Rowena; Berger Cardoso, Jodi

    2010-08-01

    Since the passing of the Victims of Trafficking and Violence Protection Act in 2000 and its reauthorization by President George Bush in 2008, federal, state and community efforts in identifying and providing services for victims of human trafficking have significantly improved. However, most of the research and resources for trafficking victims have been directed towards adults rather than children. Researchers agree that there is a growing number of sexually exploited and trafficked children in the United States yet few programs emphasize the unique experiences and special needs of this population. This article examines commercial sexual exploitation of children; differentiates the needs and problems between child prostitution and victims of human trafficking; reviews and critiques current treatment practices; and summarizes challenges and successes in working with child victims of human trafficking, offering practice and policy recommendations. Published by Elsevier Ltd.

  4. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    Science.gov (United States)

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  5. Police officers' collaboration with rape victim advocates: barriers and facilitators.

    Science.gov (United States)

    Rich, Karen; Seffrin, Patrick

    2013-01-01

    Secondary victimization may occur when rape victims make police reports. This can compromise the quality of official statements and jeopardize criminal cases. Rape reporters receive better treatment by police officers when advocates are involved and best practice police work includes such collaboration. Studies of advocates have described tension, role confusion, and poor communication with police officers. Many variables, including rape myth acceptance (RMA) and training on sexual assault dynamics, may affect officers' collaboration with advocates. There were 429 police officers who responded to a survey measuring their victim interviewing skill, formal training about rape, years on the job, number of victims known personally, number of recent rape cases, RMA, and collaboration with advocates. Results suggest that officers' interviewing skill, years on the job, and specific training are related to collaboration with victim advocates on rape cases. Professional, rather than personal, variables were most predictive of collaboration. Implications for officer selection and training are explored.

  6. Bullying Victimization Type and Feeling Unsafe in Middle School.

    Science.gov (United States)

    Bowser, John; Larson, James D; Bellmore, Amy; Olson, Chelsea; Resnik, Felice

    2018-01-01

    Given their significance to school violence, this study quantifies the association between bullying victimization and perceptions of safety separately for victimization where the type is not specified versus victimization that is physical in nature. Generalized liner mixed modeling was employed with 5,138 sixth- to eighth-grade students in 24 schools who self-reported on their bullying victimization and perceptions of school safety on an anonymous survey in fall 2015. Results indicate a multiplicative interaction exists with regard to the odds of feeling unsafe at school among those who were bullied at all (odds ratio [ OR] = 3.1) compared to those who were bullied physically ( OR = 9.12). For school nurses who work with students with a variety of concerns and health issues, this research indicates that the use of bullying victimization as an outcome, proxy and/or predictor, requires inquiry into the type of bullying experienced to aid in the care and support received.

  7. Bitter Sweetness For Fund Managers

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    An influx of small investors eager to earn money puts heavy pressure on fund managers Fund managers control millions in capital and call the shots in the stock market. They can make a fortune from a single judgment. The debut of fund management operation

  8. The Funding of Virtual Universities

    Science.gov (United States)

    Poulin, Russell; Michelau, Demaree K.

    2009-01-01

    This article reviews categorization models and the outcomes of a virtual university funding survey. Although categorization of types of funding mechanisms is a necessary analytical tool, it often hides the many and varied political decisions that created them. In commenting on the implications of the type of funding model, political forces behind…

  9. Performance-Based Funding Brief

    Science.gov (United States)

    Washington Higher Education Coordinating Board, 2011

    2011-01-01

    A number of states have made progress in implementing performance-based funding (PFB) and accountability. This policy brief summarizes main features of performance-based funding systems in three states: Tennessee, Ohio, and Indiana. The brief also identifies key issues that states considering performance-based funding must address, as well as…

  10. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... options further? Fertility Preservation - Where Does It Fit? Options for Fertility Preservation The following diagram gives a brief description of fertility preservation options available to children diagnosed with cancer before and ...

  11. Hereditary History Preserving Bisimilarity Is Undecidable

    DEFF Research Database (Denmark)

    Jurdzinski, Marcin; Nielsen, Mogens

    2000-01-01

    History preserving bisimilarity (hp-bisimilarity) and hereditary history preserving bisimilarity (hhp-bisimilarity) are behavioural equivalences taking into account causal relationships between events of concurrent systems. Their prominent feature is being preserved under action refinement...

  12. Fertility Preservation for Children Diagnosed with Cancer

    Science.gov (United States)

    ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  13. Cyber Victimization in High School: Measurement, Overlap with Face-to-Face Victimization, and Associations with Social-Emotional Outcomes

    Science.gov (United States)

    Brown, Christina Flynn; Demaray, Michelle Kilpatrick; Tennant, Jaclyn E.; Jenkins, Lyndsay N.

    2017-01-01

    Cyber victimization is a contemporary problem facing youth and adolescents (Diamanduros, Downs, & Jenkins, 2008; Kowalski & Limber, 2007). It is imperative for researchers and school personnel to understand the associations between cyber victimization and student social-emotional outcomes. This article explores (a) gender differences in…

  14. Quality of life of victims, bullies, and bully/victims among school-aged children in the Netherlands

    NARCIS (Netherlands)

    Klein Velderman, M.; Dorst, A.G. van; Wiefferink, C.H.; Detmar, S.B.; Paulussen, T.G.W.M.

    2008-01-01

    Two studies were conducted to examine the Quality of Life (QoL) of victims, bullies and bully/victims among Dutch school-aged children. Study 1 studied associations of QoL dimensions with self-reported victimisation in the Dutch sample from the KIDSCREEN Project (N = 1,669). Study 2 examined QoL of

  15. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents: A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    Eijnden, R.J.J.M. van den; Vermulst, A.A.; Rooij, A.J. van; Scholte, R.H.J.; Mheen, H. van de

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  16. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents : A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    van den Eijnden, Regina; Vermulst, Ad; van Rooij, Antonius J.; Scholte, Ron; van de Mheen, Dike

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  17. The Victim-Offender Overlap and Fear of In-School Victimization: A Longitudinal Examination of Risk Assessment Models

    Science.gov (United States)

    Melde, Chris; Esbensen, Finn-Aage

    2009-01-01

    Reports of serious violence in schools have raised general awareness and concern about safety in America's schools. In this article, the authors examine the extent to which in-school victimization is associated with students' perceived risk and fear of victimization. By expanding on Ferraro's risk assessment framework, the current study explores…

  18. Public Funding of Political Parties

    DEFF Research Database (Denmark)

    Ortuno-Ortin, Ignacio; Schultz, Christian

    This paper concerns public funding of parties. Parteis receive public funds depending on their vote share. Funds finance electoral campaigns. Two cases are investigated. In the first, some voters are policy motivated and some are ?impressionable? ? their vote depends directly on campaign...... expenditures. In the second, campaigning is informative and all voters are policy motivated. Public funds increase policy convergence in both cases. The effect is larger, the more funding depends on vote shares. When campaigns are informative, there may be multiple euqilibria. Intuitively, a large party can...

  19. Optimal distribution of science funding

    Science.gov (United States)

    Huang, Ding-wei

    2018-07-01

    We propose a new model to investigate the theoretical implications of a novel funding system. We introduce new parameters to model the accumulated advantage. We assume that all scientists are equal and follow the same regulations. The model presents three distinct regimes. In regime (I), the fluidity of funding is significant. The funding distribution is continuous. The concentration of funding is effectively suppressed. In both regimes (II) and (III), a small group of scientists emerges as a circle of elites. Large funding is acquired by a small number of scientists.

  20. Implicit Social Cognitive Processes Underlying Victim Self and Identity: Evidence With College-Aged Adults.

    Science.gov (United States)

    Sachs, Nicole M; Veysey, Bonita M; Rivera, Luis M

    2017-11-01

    Past research on victimization has relied predominantly on individuals' awareness of and willingness to self-report a victimization experience and its effect on self and identity processes. The present research adopts theoretical and methodological innovations in implicit social cognition research to provide a new perspective on how a violent victimization experience might influence identity processes outside of conscious awareness. Our main goal was to test whether individuals who have victimization experience implicitly associate the self with victims (implicit victim identity) and their stereotypes (implicit victim self-stereotyping), and the relation of these associations to explicit victim identity and self-stereotyping. Two pretests with undergraduate student participants ( Ns = 122 and 72) identified victim-related word stimuli for two Single Category Implicit Association Test (SC-IAT) measures of implicit victim identity and self-stereotyping. In Pretest Study A, participants read crime vignettes and listed words that described a victim, then in Pretest Study B, participants rated these words on victim relatedness and valence. The Main Study recruited undergraduate student participants ( N = 101) who completed the SC-IATs, self-report measures of explicit victim identity and self-stereotyping, and victimization experiences. Three of our five hypotheses were supported. Individuals with past victimization experience exhibited strong explicit victim identity and self-stereotyping, but not implicit victim identity and self-stereotyping, relative to those with no victimization experience. Explicit and implicit victim identity and self-stereotyping were unrelated. Finally, among individuals with victimization experience, a strong implicit victim identity was associated with strong implicit victim self-stereotyping. This research has implications for understanding the processes underlying revictimization and for preventing further victimization.

  1. Cost Model for Digital Preservation: Cost of Digital Migration

    Directory of Open Access Journals (Sweden)

    Ulla Bøgvad Kejser

    2011-03-01

    Full Text Available The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS Reference Model. Within this framework, which we denote the Cost Model for Digital Preservation (CMDP, the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been supplemented with findings from the literature, and our own knowledge and experience. The identified cost-critical activities have subsequently been deconstructed into measurable components, cost dependencies have been examined, and the resulting equations expressed in a spreadsheet. Currently the model can calculate the cost of different migration scenarios for a series of preservation formats for text, images, sound, video, geodata, and spreadsheets. In order to verify the model it has been tested on cost data from two different migration projects at the Danish National Archives (DNA. The study found that the OAIS model provides a sound overall framework for the cost breakdown, but that some functions need additional detailing in order to cost activities accurately. Running the two sets of empirical data showed among other things that the model underestimates the cost of manpower-intensive migration projects, while it reinstates an often underestimated cost, which is the cost of developing migration software. The model has proven useful for estimating the

  2. Corruption: Engineers are Victims, Perpetrators or Both?

    Science.gov (United States)

    Pecujlija, M; Cosic, I; Nesic-Grubic, L; Drobnjak, S

    2015-08-01

    This study was conducted in Serbian companies on licensed engineers and in its first part included a total of 336 licensed engineers who voluntarily completed the questionnaires about their ethical orientation and attitudes toward corruption and in the second part 214 engineers who participated in the first survey, who voluntarily evaluated their company's business operations characteristics. This study has clearly shown that there is a direct significant influence of the engineer's ethical orientations and attitudes toward corruption on their evaluation of the characteristics of their respective companies regarding business operations. This research also clearly shows that only engineers with a strong deontological orientation, low ethical subjectivity, and strong readiness to fight corruption, low corruption acceptance and high awareness of corruption can successfully fight corruption, improve the business operations of their companies and make beneficial changes to society. Otherwise, they should be considered as corruption perpetrators, not just as its victims.

  3. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for ...

  4. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for Patients Many adult ...

  5. Childhood Victims of Snakebites: 2000-2013.

    Science.gov (United States)

    Schulte, Joann; Domanski, Kristina; Smith, Eric Anthony; Menendez, Annelle; Kleinschmidt, Kurt C; Roth, Brett A

    2016-11-01

    Snakebites are not a reportable condition (to state health departments), and 1 major assessment of US children with snakebites was published 50 years ago. Increasing urbanization, population shifts south and west, newer antivenom therapy, and the importation of exotic snakes may have changed snakebites. Poison control centers are often consulted on treatment and collect surveillance data. Generic codes for venomous, nonvenomous, and unknown snakebites were used to characterize victims aged ≤18 years reported to US poison control centers between 2000 and 2013. Data included demographic characteristics, snake types, and outcomes. Callers reported 18 721 pediatric snakebites (annual mean, 1337). Two-thirds were male (n = 12 688 [68%]), with a mean age of 10.7 years. One-half of the snakebites were venomous (n = 9183 [49%]), with copperheads (n = 3602 [39%]) and rattlesnakes (n = 2859 [31%]) the most frequently identified. Reported copperhead bites increased 137% and unknown crotalids (venomous) increased 107%. Exotic (nonnative) exposures were reported in 2% of cases. All 50 states reported snakebites, but one-quarter occurred in Texas and Florida. Rates for total snakebites and venomous snakebites were highest in West Virginia, Oklahoma, and Louisiana. One-fifth required ICU admission. Limited data for 28% of bites for antivenom treatment suggests increasing use. Four victims died. The epidemiology of pediatric snakebites is changing. One-half of the reported exposures were venomous, and copperhead bites and exotic species are being reported more frequently. Although snakebite-related deaths are rare, ICU admission is common. Antivenom treatment is incompletely reported, but its use is increasing. Copyright © 2016 by the American Academy of Pediatrics.

  6. Brain Resuscitation in the Drowning Victim

    Science.gov (United States)

    Topjian, Alexis A.; Berg, Robert A.; Bierens, Joost J. L. M.; Branche, Christine M.; Clark, Robert S.; Friberg, Hans; Hoedemaekers, Cornelia W. E.; Holzer, Michael; Katz, Laurence M.; Knape, Johannes T. A.; Kochanek, Patrick M.; Nadkarni, Vinay; van der Hoeven, Johannes G.

    2013-01-01

    Drowning is a leading cause of accidental death. Survivors may sustain severe neurologic morbidity. There is negligible research specific to brain injury in drowning making current clinical management non-specific to this disorder. This review represents an evidence-based consensus effort to provide recommendations for management and investigation of the drowning victim. Epidemiology, brain-oriented prehospital and intensive care, therapeutic hypothermia, neuroimaging/monitoring, biomarkers, and neuroresuscitative pharmacology are addressed. When cardiac arrest is present, chest compressions with rescue breathing are recommended due to the asphyxial insult. In the comatose patient with restoration of spontaneous circulation, hypoxemia and hyperoxemia should be avoided, hyperthermia treated, and induced hypothermia (32–34 °C) considered. Arterial hypotension/hypertension should be recognized and treated. Prevent hypoglycemia and treat hyperglycemia. Treat clinical seizures and consider treating non-convulsive status epilepticus. Serial neurologic examinations should be provided. Brain imaging and serial biomarker measurement may aid prognostication. Continuous electroencephalography and N20 somatosensory evoked potential monitoring may be considered. Serial biomarker measurement (e.g., neuron specific enolase) may aid prognostication. There is insufficient evidence to recommend use of any specific brain-oriented neuroresuscitative pharmacologic therapy other than that required to restore and maintain normal physiology. Following initial stabilization, victims should be transferred to centers with expertise in age-specific post-resuscitation neurocritical care. Care should be documented, reviewed, and quality improvement assessment performed. Preclinical research should focus on models of asphyxial cardiac arrest. Clinical research should focus on improved cardiopulmonary resuscitation, re-oxygenation/reperfusion strategies, therapeutic hypothermia

  7. Library Services Funding Assessment

    Science.gov (United States)

    Lorig, Jonathan A.

    2004-01-01

    The Glenn Technical Library is a science and engineering library that primarily supports research activities at the Glenn Research Center, and provides selected services to researchers at all of the NASA research centers. Resources available in the library include books, journals, CD-ROMs, and access to various online sources, as well as live reference and inter-library loan services. The collection contains over 77,000 books, 800,000 research reports, and print or online access to over 1,400 journals. Currently the library operates within the Logistics and Technical Information Division, and is funded as an open-access resource within the GRC. Some of the research units at the GRC have recently requested that the library convert to a "pay-for-services" model, in which individual research units could fund only those journal subscriptions for which they have a specific need. Under this model, the library would always maintain a certain minimum level of pooled-expense services, including the ready reference and book collections, and inter-library loan services. Theoretically the "pay-for-services" model would encourage efficient financial allocation, and minimize the extent to which paid journal subscriptions go unused. However, this model also could potentially negate the benefits of group purchases for journal subscriptions and access. All of the major journal publishers offer package subscriptions that compare favorably in cost with the sum of individual subscription costs for a similar selection of titles. Furthermore, some of these subscription packages are "consortium" purchases that are funded collectively by the libraries at multiple NASA research centers; such consortia1 memberships would be difficult for the library to pay, if enough GRC research units were to withdraw their pooled contributions. cost of collectively-funded journal access with the cost of individual subscriptions. My primary task this summer is to create the cost dataset framework, and

  8. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems.

    Science.gov (United States)

    Park, Subin; Lee, Yeeun; Jang, Hyesue; Jo, Minkyung

    2017-05-19

    We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES), exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  9. Temperamental Differences in Children’s Reactions to Peer Victimization

    Science.gov (United States)

    Sugimura, Niwako; Rudolph, Karen D.

    2015-01-01

    Objective This research examined the hypothesis that temperament and sex moderate the contribution of peer victimization to children’s subsequent adjustment (aggression and depressive symptoms). Method Children (125 boys, 158 girls; M age = 7.95 years, SD = 0.32; 77.7% White, 22.3% minority) and teachers reported on overt and relational victimization. Parents rated children’s temperament (inhibitory control and negative emotionality) and depressive symptoms, and teachers reported on children’s overt and relational aggression. Results Across a one-year time period, (a) overt victimization predicted overt aggression in girls with poor inhibitory control; (b) overt and relational victimization predicted depressive symptoms in girls with high negative emotionality; and (c) relational victimization predicted depressive symptoms in boys with low negative emotionality. Conclusions This research helps to explain individual variation in children’s reactions to peer victimization, and has implications for person-by-environment models of development. Moreover, this research informs the development of targeted intervention programs for victimized youth that bolster specific resources depending on their temperament. PMID:22420650

  10. Toward establishing basic rights of victims in Japan

    Directory of Open Access Journals (Sweden)

    Morosawa Hidemichi

    2008-01-01

    Full Text Available The author talks about improving victim rights in Japan and his important role in it. A period of Victims’ Renaissance in Japan began in the 1990s when the Japanese Association of Victimology and Mito Victim Assistance Cener, first non-governmental community-based integrated victim support center in Japan were established. Since May 1999 to May 2004, four laws such as “Crime Victim Protection Law”, “Child Abuse Prevention Law”, “Law for Proscribing Stalking Behavior” and so on were enacted and six laws were reformed. The word “rights of victim”, did not appear in any laws. After 2000, the National Association of Crime Victims and Surviving Families (NAVS played an important role. This Association achieved a great success in securing victims a position as the subject of rights. In June 2007, Japan changed the Criminal Procedure Law. This new law will be effective on six months after the day of promulgation. Japanese Government will promulgate it till the end of 2007. Under this new law, crime victims will be allowed to take part in criminal trials, and also make statements during trials.

  11. [A sociography of elderly victims of family violence in Portugal].

    Science.gov (United States)

    Gil, Ana Paula; Santos, Ana João; Kislaya, Irina; Santos, César; Mascoli, Luísa; Ferreira, Alexandra Inácio; Vieira, Duarte Nuno

    2015-06-01

    This article presents data on violence against persons aged 60 years or older and living in Portugal for at least 12 months. The cross-sectional descriptive study collected data with a face-to-face questionnaire applied to victims that had sought assistance at three government institutions and one non-governmental support service for victims. The non-probabilistic sample included 510 victims of violence in family settings. Physical and psychological violence were the most common (87.8% and 69.6%, respectively). Financial violence was reported by 47.5% of the victims, followed by sexual assault (7.5%) and neglect (6.5%). The majority of victims (74.1%) reported more than one type of violence. Victims were mostly women, and mean age was 70.7 years. Most of the perpetrators belonged to the nuclear family, namely spouses or partners, sons/sons-in-law, and daughters/daughters-in-law. However, differences were observed according to victim's gender. The results indicate that violence is not a uniform phenomenon, presenting different configurations.

  12. Workplace Victimization and Discrimination in China: A Nationwide Survey.

    Science.gov (United States)

    Zhang, Huiping

    2017-09-01

    Workplace victimization and discrimination have been intensively studied in the West, especially on the antecedents and consequences of this phenomenon. Surprisingly, little is known about the incidence and associated health problems of workplace victimization and discrimination in contemporary China. Using a representative nationwide sample of 1,138 Chinese employees conducted in 2015, this study attempted to estimate the prevalence, risk factors, and associated consequences of workplace victimization and discrimination in China. It is found that the prevalence rate of preceding 5-year workplace discrimination and victimization was 33% and 12.9%, respectively. Male employees who perceived higher work gains were less likely to experience workplace victimization and those who had higher career efficacy and unemployment anxiety were more likely to experience job discrimination or victimization. Female employees who received tertiary education were less likely to experience job discrimination and being married tended not to experience workplace victimization. Perceived job discrimination had negative impact on male employees' job satisfaction as well as on female employees' happiness. The implications of these findings are finally discussed in the Chinese context.

  13. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems

    Directory of Open Access Journals (Sweden)

    Subin Park

    2017-05-01

    Full Text Available We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES, exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  14. Fertility preservation in Turner syndrome.

    Science.gov (United States)

    Grynberg, Michaël; Bidet, Maud; Benard, Julie; Poulain, Marine; Sonigo, Charlotte; Cédrin-Durnerin, Isabelle; Polak, Michel

    2016-01-01

    Premature ovarian insufficiency is a relatively rare condition that can appear early in life. In a non-negligible number of cases the ovarian dysfunction results from genetic diseases. Turner syndrome (TS), the most common sex chromosome abnormality in females, is associated with an inevitable premature exhaustion of the follicular stockpile. The possible or probable infertility is a major concern for TS patients and their parents, and physicians are often asked about possible options to preserve fertility. Unfortunately, there are no recommendations on fertility preservation in this group. The severely reduced follicle pool even during prepubertal life represents the major limit for fertility preservation and is the root of numerous questions regarding the competence of gametes or ovarian tissue crybanked. In addition, patients suffering from TS show higher than usual rates of spontaneous abortion, fetal anomaly, and maternal morbidity and mortality, which should be considered at the time of fertility preservation and before reutilization of the cryopreserved gametes. Apart from fulfillment of the desire of becoming genetic parents, TS patients may be potential candidates for egg donation, gestational surrogacy, and adoption. The present review discusses the different options for preserving female fertility in TS and the ethical questions raised by these approaches. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  15. Sovereign funds: energy products and investors in energy

    International Nuclear Information System (INIS)

    Bertin Delacour, Caroline

    2009-01-01

    Energy, especially oil, is the source of wealth of two-thirds of SWFs, located in the Middle East, Africa, America, Russia and Norway. The countries exporting natural resources use these investment vehicles to fight against the drawbacks of their rent economy: price volatility, non-renewal of resources, resource curse and 'dutch disease'. SWFs can indeed stabilize export earnings, preserve wealth for future generations and diversify the economy. Energy is also a prime area for investment of sovereign wealth funds, which have different objectives depending on their origin. The funds of the Persian Gulf, already rich in fossil resources, form partnerships with leading groups in the field of energy to acquire the technology they lack. The funds from countries lacking natural resources, such as China, seek to take control of foreign companies operating or processing raw materials with a view to secure energy independence of their country

  16. Protective Factors for Psychotic Symptoms Among Poly-victimized Children.

    Science.gov (United States)

    Crush, Eloise; Arseneault, Louise; Jaffee, Sara R; Danese, Andrea; Fisher, Helen L

    2018-04-06

    Experiencing victimization in early life has been repeatedly shown to be associated with the emergence of psychotic symptoms in childhood. However, most victimized children do not develop psychotic symptoms and why this occurs is not fully understood. This study investigated which individual, family-level, and wider community characteristics were associated with an absence of psychotic symptoms among children at risk for psychosis by virtue of their exposure to multiple victimization experiences (poly-victimization). Participants were from the Environmental Risk Longitudinal Twin Study, a nationally representative cohort of 2232 UK-born twins. Exposure to maltreatment, bullying and domestic violence prior to age 12 was determined from interviews with mothers, children, and observations by research workers at ages 5, 7, 10, and 12. Children were interviewed about psychotic symptoms at age 12. Protective factors were measured at ages 5, 7, 10, and 12. Childhood poly-victimization was associated with age-12 psychotic symptoms (OR = 4.61, 95% CI 2.82-7.52), but the majority of poly-victimized children did not report symptoms (80.7%). Having a relatively high IQ, more positive atmosphere at home, and higher levels of neighborhood social cohesion were found to be protective against childhood psychotic symptoms among poly-victimized children and also in the whole sample. However, "protected" poly-victimized children displayed elevated levels of other mental health problems compared to nonvictimized children. Children's characteristics, family context, and the wider community were all found to protect children from developing early psychotic symptoms, even when they were victimized multiple times. These findings indicate targets for multilevel preventive interventions.

  17. Net Stable Funding Ratio: Impact on Funding Value Adjustment

    OpenAIRE

    Siadat, Medya; Hammarlid, Ola

    2017-01-01

    In this paper we investigate the relationship between Funding Value Adjustment (FVA) and Net Stable Funding Ratio (NSFR). FVA is defined in a consistent way with NSFR such that the new framework of FVA monitors the costs due to keeping NSFR at an acceptable level, as well. In addition, the problem of choosing the optimal funding strategy is formulated as a shortest path problem where the proposed FVA framework is applied in the optimization process. The solution provides us with the optimal f...

  18. 76 FR 52305 - Notice of Funding Availability: Section 515 Multi-Family Housing Preservation Revolving Loan Fund...

    Science.gov (United States)

    2011-08-22

    ... intermediary. (iii) Be in compliance with all Rural Development programs and civil rights requirements or have... delinquent debt to the Federal Government including a non- tax judgment lien (other than a judgment in the U..., subordinating its security interest on the ultimate recipient's property to the lien of the intermediary so that...

  19. 77 FR 42265 - Notice of Funding Availability: Section 515 Multi-Family Housing Preservation Revolving Loan Fund...

    Science.gov (United States)

    2012-07-18

    ..., proposed intermediary or proposed ultimate recipient on the basis of sex, marital status, race, familial... compliance with all Rural Development program requirements or have an Agency approved work plan in place which will correct a non-compliance status. (b) Any delinquent debt to the Federal Government including...

  20. Risk analytics for hedge funds

    Science.gov (United States)

    Pareek, Ankur

    2005-05-01

    The rapid growth of the hedge fund industry presents significant business opportunity for the institutional investors particularly in the form of portfolio diversification. To facilitate this, there is a need to develop a new set of risk analytics for investments consisting of hedge funds, with the ultimate aim to create transparency in risk measurement without compromising the proprietary investment strategies of hedge funds. As well documented in the literature, use of dynamic options like strategies by most of the hedge funds make their returns highly non-normal with fat tails and high kurtosis, thus rendering Value at Risk (VaR) and other mean-variance analysis methods unsuitable for hedge fund risk quantification. This paper looks at some unique concerns for hedge fund risk management and will particularly concentrate on two approaches from physical world to model the non-linearities and dynamic correlations in hedge fund portfolio returns: Self Organizing Criticality (SOC) and Random Matrix Theory (RMT).Random Matrix Theory analyzes correlation matrix between different hedge fund styles and filters random noise from genuine correlations arising from interactions within the system. As seen in the results of portfolio risk analysis, it leads to a better portfolio risk forecastability and thus to optimum allocation of resources to different hedge fund styles. The results also prove the efficacy of self-organized criticality and implied portfolio correlation as a tool for risk management and style selection for portfolios of hedge funds, being particularly effective during non-linear market crashes.

  1. Relationship between income and repeat criminal victimization in Brazil

    Directory of Open Access Journals (Sweden)

    Marcelo Justus

    2015-09-01

    Full Text Available This study analyzes the effect of income on repeat criminal victimization in Brazil using data from the 2009 National Household Sample Survey and its special supplement on victimization and access to justice. Two count-data models were estimated for four types of crime: theft, robbery, attempted theft/robbery, and physical assault. A positive nonlinear effect of income on repeat victimization for the three types of property crimes and a negative nonlinear effect of income on physical assault were observed.

  2. Nuclear Waste Fund management

    International Nuclear Information System (INIS)

    Hobart, L.

    1984-01-01

    The Nuclear Waste Fund involves a number of features which make it a unique federal program. Its primary purpose is to finance one of the largest and most controversial public works programs in the history of the United States. Despite the program's indicated size and advance publicity, no one knows exactly where the anticipated projects will be built, who will construct them, what they will look like when they are done or how they will be operated and by whom. Implimentation of this effort, if statutory targets are actually met, covers a 16-year period. To cover the costs of the program, the Federal Government will tax nuclear power at the rate of 1 mil per kilowatt hour generated. This makes it one of the biggest and longest-lived examples of advance collections for construction work in progress in the history of the United States. While the Department of Energy is authorized to collect funds for the program the Nuclear Regulatory Commission has the authority to cut off this revenue stream by the shutdown of particular reactors or particular reactor types. If all goes well, the Federal Government will begin receiving spent nuclear fuel by 1998, continuing to assess a fee which will cover operating and maintenance costs. If all does not go well, the Federal Government and/or utilities will have to take other steps to solve the problem of permanent disposal. Should the latter circumstance prevail, presumably not only used to date but the $7.5 billion would be spent. The Nuclear Waste Policy Act of 1982, contains no clear provision for utility refunds in that case

  3. Preservation theorems on finite structures

    International Nuclear Information System (INIS)

    Hebert, M.

    1994-09-01

    This paper concerns classical Preservation results applied to finite structures. We consider binary relations for which a strong form of preservation theorem (called strong interpolation) exists in the usual case. This includes most classical cases: embeddings, extensions, homomorphisms into and onto, sandwiches, etc. We establish necessary and sufficient syntactic conditions for the preservation theorems for sentences and for theories to hold in the restricted context of finite structures. We deduce that for all relations above, the restricted theorem for theories hold provided the language is finite. For the sentences the restricted version fails in most cases; in fact the ''homomorphism into'' case seems to be the only possible one, but the efforts to show that have failed. We hope our results may help to solve this frustrating problem; in the meantime, they are used to put a lower bound on the level of complexity of potential counterexamples. (author). 8 refs

  4. Blogs as Objects of Preservation

    DEFF Research Database (Denmark)

    Stepanyan, Karen; Gkotsis, George; Kalb, Hendrik

    2012-01-01

    challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building on the exist......challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building...... analysis) and, subsequently, improve the final reformulation of the properties. To demonstrate the applicability of the modified framework, the paper presents a use case of a blog preservation initiative that is informed by stakeholder interviews and evaluation of structural and technological foundations...

  5. Perceptions of teachers' support, safety, and absence from school because of fear among victims, bullies, and bully-victims.

    Science.gov (United States)

    Berkowitz, Ruth; Benbenishty, Rami

    2012-01-01

    This study examines the distribution of the types of involvement in school violence (bullies, victims, bully-victims, and students not involved in violence) among the general population of Israeli school students. The prevalence of these different types of involvement was also examined according to gender, age or school level (junior high vs. high school), and ethnicity (Jewish vs. Arab). Further, the study examines the relationships between type of involvement in school violence and students' perceptions of teachers' support, safety, and absence from school because of fear. Data were obtained from a nationally representative, stratified sample of 13,262 students in grades 7-11 who responded to a self-report questionnaire on victimization by, and perpetration of, school violence and on perceptions of school climate. Data revealed that 3.6% of all students were victims of bullying (18.5% of those involved in violence). The proportion of bully-victims among male students was 6.4% (21.9% of all involved) compared with 1.1% (11.2% of all involved) among females. Bully-victims reported the lowest levels of teacher support and feelings of security and missed school because of fear significantly more often. The results point to the uniqueness of the bully-victim group. This group presents multiple challenges for school staff with these students needing special attention. © 2012 American Orthopsychiatric Association.

  6. Active preservation - otherwise no archives

    International Nuclear Information System (INIS)

    Norberg, E.

    1996-01-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed

  7. Yeasts preservation: alternatives for lyophilisation

    OpenAIRE

    Nyanga, Loveness K.; Nout, Martinus J. R.; Smid, Eddy J.; Boekhout, Teun; Zwietering, Marcel H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts during 6 months storage at 4 and 25 °C. None of the yeast cultures showed a significant loss in viable cell count during 6 months of storage at 4 °C upon lyophilisation and preservation in dry rice cak...

  8. Polarization-preserving holey fibers

    DEFF Research Database (Denmark)

    Broeng, Jes; Mogilevtsev, Dmitri; Libori, Stig E. Barkou

    2001-01-01

    In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization......In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization...

  9. Active preservation - otherwise no archives

    Energy Technology Data Exchange (ETDEWEB)

    Norberg, E [National Swedish Archives, Stockholm (Sweden)

    1996-12-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed.

  10. 36 CFR 910.32 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Historic preservation. 910.32... DEVELOPMENT AREA Standards Uniformly Applicable to the Development Area § 910.32 Historic preservation... Preservation Plan of the Corporation, are specified for preservation, shall be acomplished (a) in accordance...

  11. ACHP | Summary of the Preserve America Initiative

    Science.gov (United States)

    Initiative Preserve America: Explore and Enjoy Our Heritage (logo) Summary of the Preserve America Initiative Preserve America is a White House initiative that encourages and supports community efforts to preserve and enjoy our priceless cultural and natural heritage. The goals of the initiative include a greater shared

  12. KNK-II knowledge preservation and related activities in Germany

    International Nuclear Information System (INIS)

    Knebel, J.; Wehmann, U.; Stanculescu, A.

    2004-01-01

    Many of the scenarios describing possible energy futures, e.g., the World Energy Council and the Intergovernmental Panel on Climate Change (IPCC), foresee a role for nuclear power in meeting a growing world energy demand through 2050. While some scenarios explore the impact of a nuclear phase out, others envision a major growth in nuclear technology's share of the world energy mix. Given the forecasted growth in world population and in economic development, the environmental advantages of nuclear power, and concerns over climate change and the growth of greenhouse gas emissions, it is not unreasonable to expect an increased interest in nuclear power in the coming decades. Loss of nuclear knowledge is a serious concern, in particular with regard to areas where, for various reasons, nuclear technology development and innovation has been slowed down. Knowledge can be preserved by archival techniques and by passing it on to new generations. In the case of the Federal Republic of Germany, in spite of the lack of funding and political support, both avenues are followed. Data retrieval and preservation by archiving activities for the German experimental fast reactor KNK-II were undertaken within the framework of IAEA's initiative on Fast Reactor Knowledge Preservation. The paper will shortly introduce the IAEA initiative (scope, objectives, status, and outlook). The general approach to nuclear knowledge preservation in Germany will be presented, and the concrete archiving activities undertaken for KNK-II will be summarized. (author)

  13. Comparison of Tissue Preservation using Formalin and Ethanol as Preservative Formula

    OpenAIRE

    See Woan Shian; Arifin Soenggono; Sawkar Vijay Pramod

    2016-01-01

    Background: Tissue preservation can be performed through embalming, by providing the chemical embalming fluid to the human remains. Formalin’s preservative formula is the foundation for modern methods of embalming. Unfortunately, this preservative formula has several disadvantages. While Ethanol’s preservative formula is a considerable agent to replace formalin’s preservative formula. The aim of this study was to compare the tissue preservation using formalin and ethanol as preservative formu...

  14. Managerial multitasking in the mutual fund industry

    OpenAIRE

    Agarwal, Vikas; Ma, Linlin; Mullally, Kevin

    2015-01-01

    We examine the determinants and consequences of mutual fund managers simultaneously managing multiple funds. Well-performing managers multitask by taking over poorly performing funds or launching new funds. Subsequent to multitasking, funds run by managers prior to multitasking (i.e., incumbent funds) experience performance deterioration while the performance of the acquired funds improves. Multitasking increases the assets of fund companies but results in a wealth transfer from shareholders ...

  15. Long-Term Preservation of Digital Information in China: Some Problems and Solutions

    Science.gov (United States)

    Liu, Jiazhen; Du, Peng

    2009-01-01

    Purpose: The purpose of this paper to describe the research work on the long-term preservation of Chinese digital information funded by National Natural Science Foundation of China (NSFC) since 2001. Design/methodology/approach: The paper provides an overview, in text and figures, of ways in which e-documents originating in China, in now obsolete…

  16. Preventing Pollution to Local Waters, Bay; Preserving Historic Natural Bridge in Virginia

    Science.gov (United States)

    In helping to preserve one of the oldest tourist destinations in the country – a spectacular natural land bridge in Virginia – EPA funding is protecting the surrounding land from development that would have impacted local waters and the Chesapeake Bay.

  17. 77 FR 71447 - Notice of Fee Schedule for Reviewing Historic Preservation Certification Applications and...

    Science.gov (United States)

    2012-11-30

    ... applications for Federal tax incentives contained in Section 47 of the Internal Revenue Code (referred to... through the NPS's Web site at http://www.nps.gov/tps/tax-incentives.htm . The new fee schedule applies... preservation tax certification, and such funds shall be available until expended without further appropriation...

  18. 28 CFR Appendix to Subpart A - International Terrorism Victim Expense Reimbursement Program (ITVERP); Chart of Expense...

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false International Terrorism Victim Expense... Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIME VICTIM SERVICES International Terrorism Victim Expense Reimbursement Program Pt. 94, Subpt. A, App. Appendix to Subpart A—International Terrorism Victim Expense...

  19. Attitudes of Future Human Service Professionals: The Effects of Victim and Helper Qualities.

    Science.gov (United States)

    Liebkind, Karmela; Eranen, Liisa

    2001-01-01

    Investigates the attitudes of future members in human service professions toward victims, based on the qualities effected by trauma victims and their helpers. Reports that the high-trauma and poorly adapted victims elicited more negative attitudes than did the low-trauma and well-adapted victims. (CMK)

  20. Compensating Victims of Violent Crime: Potential Costs and Coverage of a National Program.

    Science.gov (United States)

    Garofalo, James; Sutton, L. Paul

    Data generated from an ongoing national crime victimization survey and details about the circumstances and consequences of personal crimes form the basis for estimating the cost of a national program to compensate victims of violent crime. Victim compensation programs represent an attempt to rectify the neglect of the victim. Uncertainty about the…

  1. Disability in Relation to Different Peer-Victimization Groups and Psychosomatic Problems

    Science.gov (United States)

    Beckman, Linda; Stenbeck, Magnus; Hagquist, Curt

    2016-01-01

    The purpose of this study was to examine the associations between disability, victims, perpetrators, and so-called "bully-victims" (someone reporting being both a victim and a perpetrator) of traditional, cyber, or combined victimization or perpetration and psychosomatic health among adolescents. Authors analyzed cross-sectional data…

  2. Development and validation of the multidimensional offline and online peer victimization scale

    NARCIS (Netherlands)

    Sumter, S.R.; Valkenburg, P.M.; Baumgartner, S.E.; Peter, J.; van der Hof, S.

    2015-01-01

    Peer victimization can seriously impair one’s well-being. As youth spend more time on the Internet, a new form of peer victimization has emerged, namely, online peer victimization. To fully comprehend peer victimization among today’s youth, there is a need for a psychometrically sound measure that

  3. Do Victimization Experiences Accentuate Reactions to Ostracism? An Experiment Using Cyberball

    Science.gov (United States)

    Ruggieri, Sabrina; Bendixen, Mons; Gabriel, Ute; Alsaker, Françoise

    2013-01-01

    Based on the notion that the history of victimization has an impact on the sensitivity to current victimization situations this study investigated whether victims of bullying show more pronounced responses to single episodes of social exclusion. We examined whether victimization experiences in school are associated with responses to ostracism in a…

  4. Understanding Risk-taking Behavior in Bullies, Victims, and Bully Victims Using Cognitive- and Emotion-Focused Approaches.

    Science.gov (United States)

    Poon, Kean

    2016-01-01

    Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth's overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully victim). This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and an emotion-focused model of risk taking, and to clarify how adolescents' characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age = 14.5, M = 65, F = 71) were recruited and grouped according to bullying identity: Bully ( n = 27), Victim ( n = 20), Bully victim ( n = 37) and Control ( n = 52). Cognitive Appraisal of Risky Events (CARE) questionnaire was used to measure participants' expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT) was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  5. Understanding risk-taking behavior in bullies, victims, and bully-victims using cognitive- and emotion-focused approaches.

    Directory of Open Access Journals (Sweden)

    Kean Poon

    2016-11-01

    Full Text Available Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth’s overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully-victim. This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and a emotion-focused model of risk taking, and to clarify how adolescents’ characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age =14.5, M= 65, F =71 were recruited and grouped according to bullying identity: Bully (n =27, Victim (n =20, Bully-victim (n =37 and Control (n =52. Cognitive Appraisal of Risky Events (CARE questionnaire was used to measure participants’ expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully-victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully-victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully-victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  6. There are no "innocent victims": the influence of just world beliefs and prior victimization on rape myth acceptance.

    Science.gov (United States)

    Vonderhaar, Rebecca L; Carmody, Dianne Cyr

    2015-06-01

    Utilizing data from an online survey of 979 university students, this study explores the relationship between prior sexual assault victimization experiences, belief in a just world, and acceptance of rape myths. Results indicated that men, younger respondents, and those with less education were more likely to support rape myths. Support for just world beliefs and rape myths were also positively associated, while rape victims exhibited less support for rape myths than non-victims. Implications for future studies are discussed. © The Author(s) 2014.

  7. Devenir victime des pesticides:Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel, Jean-Noël; Prete, Giovanni

    2014-01-01

    Cet article analyse les effets du recours au droit sur la mobilisation des travailleurs agricoles victimes des pesticides. Il repose sur une enquête qualitative auprès des membres de l’association Phyto-victimes, qui réunit ces agriculteurs, ainsi que de leurs proches et des professionnels du droit avec lesquels ils interagissent. À partir de ce matériau, nous retraçons les parcours suivis par les agriculteurs pour obtenir une reconnaissance de leur statut de victimes des pesticides. Nous ren...

  8. Devenir victime des pesticides : Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel , Jean-Noël; Prete , Giovanni

    2014-01-01

    International audience; A partir du cas de l’association Phyto-victimes, qui regroupe des agriculteurs souffrant de maladies chroniques qu’ils imputent aux pesticides, l’article met en évidence les effets ambigus du droit sur les mobilisations de victimes. L’article met en évidence les mécanismes par lesquels le droit amène des exploitants agricoles exposés à des pesticides et tombés malades à prendre conscience de leur statut de victimes, du préjudice qu’ils ont subi et des responsabilités e...

  9. Local quantum channels preserving classical correlations

    International Nuclear Information System (INIS)

    Guo Zhihua; Cao Huaixin

    2013-01-01

    The aim of this paper is to discuss local quantum channels that preserve classical correlations. First, we give two equivalent characterizations of classical correlated states. Then we obtain the relationships among classical correlation-preserving local quantum channels, commutativity-preserving local quantum channels and commutativity-preserving quantum channels on each subsystem. Furthermore, for a two-qubit system, we show the general form of classical correlation-preserving local quantum channels. (paper)

  10. Shaping the Victim: Borders, security, and human trafficking in Albania

    Directory of Open Access Journals (Sweden)

    James Campbell

    2013-09-01

    Full Text Available Borders are productive sites where knowledge is gathered and migrant populations are formed. The knowledge gathered from victims of trafficking reinforces a victim narrative that represents a perceived threat to society by highlighting violence, criminality, coercion, and naivety. Using Albania as a case in point, the article looks at trafficked people and the narratives of victimhood that surround them. In the case of trafficked people, the border projected out towards other states produces a discursively defined victim of trafficking. When projected back within the national territory, the border essentially produces a criminalised sex worker. To argue this point, the article discusses the role victims of trafficking play in the EU and looks at how international norms espoused by the OSCE and IOM have prepped the Albanian border for EU ascension and created the means for governable populations within Albania.

  11. [The profile of female victims of conjugal violence].

    Science.gov (United States)

    Vasseur, Philippe

    2004-12-18

    To define the profile of female victims of conjugal violence examined in the Legal Medicine emergency unit of the Hotel-Dieu hospital in Paris. A self-administered questionnaire with 15 questions was distributed to 100 victims. The 100 victims replied: 86 cases of violence took place usually in the home, 78 episodes of violence were multiple and complaints were rarely lodged after the first episodes. Mental and sexual violence were severe and unrecognized. Eighty women interviewed suffered from mental violence. In 43 cases, alcohol played a determining role in the onset of such violence. Female victims of conjugal violence do not have a specific profile. The law of silence persists, but the increase in the number of complaints from North African and African women is encouraging for the future.

  12. Family, Teachers, and Peers: Keys for Supporting Victims of Bullying

    Directory of Open Access Journals (Sweden)

    María Jesús Cava

    2011-07-01

    Full Text Available The aim of the current study was to analyse the differences in psychological adjustment in victims of bullying as a function of the quality of their relationships with parents, teachers, and peers. More specifically, it was compared four psychological adjustment indicators (self-esteem, depressive mood, loneliness, and stress perception in victims with good or bad communication with his/her mother, good or bad communication with his/her father, high or low perception of teacher´s help, and high or low identification with their peer group. The initial sample was composed of 1795 adolescents aged from 11 to 18 years old (M = 14.2, SD = 1.68. Results indicated better psychological adjustment in victims with better relationships with their parents, teachers, and peers than in victims with worse quality relationships. These results are discussed, and their implications in the development of intervention programmes on school violence are pointed out.

  13. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  14. Perioperative care of a pregnant trauma victim: a review of ...

    African Journals Online (AJOL)

    Adele

    2004-05-03

    May 3, 2004 ... (until proven otherwise) in any female trauma patient of child- ... The perioperative management of pregnant trauma victims re- ... trauma, abdominal trauma, head injury, cervical spine injury, fetal injury, gun shot wounds, blunt.

  15. Family victim advocates: the importance of critical job duties

    Directory of Open Access Journals (Sweden)

    Teresa H. Young

    Full Text Available Child advocacy centers across the United States intervened in more than 250,000 child abuse cases in 2011(National Children's Alliance, 2012. Understanding the work of family victim advocates is imperative to helping children and families in child abuse cases. In this exploratory study, we surveyed advocates and program directors from child advocacy centers (CACs across the United States to compare their perceptions of the critical job duties of family victim advocates. Data analysis revealed that CAC directors rated the importance of these duties significantly higher than family victim advocates. Results suggest the need for additional training to ensure that family victim advocates understand the importance of critical job duties to meet the needs of children and families in child abuse cases.

  16. A disclosure scheme for protecting the victims of domestic violence.

    Science.gov (United States)

    Griffith, Richard

    2017-06-08

    Richard Griffith, Senior Lecturer in Health Law at Swansea University, explains how the Domestic Violence Disclosure Scheme aims to protect potential victims by allowing disclosure of a partner's previous crimes.

  17. Romantic Attachment, Conflict Resolution Styles, and Teen Dating Violence Victimization.

    Science.gov (United States)

    Bonache, Helena; Gonzalez-Mendez, Rosaura; Krahé, Barbara

    2017-09-01

    Although research on dating violence has increased in the last decades, little is known about the role of romantic attachment and conflict resolution in understanding victimization by an intimate partner among adolescents. This study examined the relationships between insecure attachment styles, destructive conflict resolution strategies, self-reported and perceived in the partner, and psychological and physical victimization by a dating partner in 1298 adolescents (49% girls). Anxious attachment was related to both forms of victimization via self-reported conflict engagement and conflict engagement attributed to the partner among boys and girls. Moreover, both insecure attachment styles were also indirectly linked to victimization via self-reported withdrawal and conflict engagement perceived in the partner, but only among boys. The implications of the findings for promoting constructive communication patterns among adolescents for handling their relationship conflicts are discussed.

  18. Recognizing victims of human trafficking in the pediatric emergency department.

    Science.gov (United States)

    Becker, Heather J; Bechtel, Kirsten

    2015-02-01

    Human trafficking is a form of modern-day slavery that is rapidly expanding in the United States and throughout the world. It is a crime under both the United States and international law. The child and adult victims of human trafficking are denied their basic human rights and subjected to unspeakable physical and emotional harm. Traffickers exert complete control over their victims and are proficient at hiding their condition from authorities. Healthcare practitioners may be the only professionals who come into contact with victims if they present for medical care. This article will describe human trafficking and its potential victims, as well as guide medical management and access to services that will ensure their safety and restore their freedom.

  19. The management of victims of collective accidents. Methodological guide

    International Nuclear Information System (INIS)

    Meadel, Juliette; Marie, Eugenie; Badorc, Yves; Riviere, Anne; Chalaux, Marion; Heisserer, Julie; Tosello-Orsola, Romain; Gelli, Robert; Boura, Florent; Sookahet, Stephanie; Deparis, Benjamin; Tarabeux, Xavier; Besson, Jean-Paul; Porterie, Frederique; Paris-Muller, Gaelle; Marchelli, Sylvie; Gesret, Samuel; Guthleben, Sandra; Sauvee, Marie-Line; Percie Du Sert, Xavier; Bossuyt, Yves; Viteau, Thierry; Etienne-Diener, Annick; Le Caro, Sylvie; Taffin, Monique; Deluz, Damien; Cremniter, Didier; Philippe, Jean-Marc; Ouvrard, Anne-Emmanuelle; Andre, Jean-Marc; Lansman, Patrick; Jouty, Remi; Delbono, Martine; Cebe, Philippe; Le Divenah, Jean-Paul; Vandoorne, Pierre-Jean; Bertin, Jerome; Sadowski, Isabelle; Bovis, Marcel; Gicquel, Stephane; Seco, Sophia; Ieche, Clara; Bertrand, Paul; Tricot, Sandrine; Gomes, Thierry; Marissal, Jean-Luc; Voss, Beatrice; Mescam, Marie; Le Chevalier, Elisabeth; Bouchet, Loic; Lienhard, Claude; Dantchev, Nicolas; Delval, Christophe; Naudascher, Michel; Sublet, Xavier; Cutajar, Chantal; Trestard, Jean-Francois; Quentin, Cecile

    2017-11-01

    This publication proposes several sets of sheets. A first set concerns the crisis phase itself and sheets present or describe the coordination during an emergency phase, the role of the public prosecutor, the role of the prefect, the crisis and support Centre of the Ministry for Foreign Affairs, the health management of victims, the mobilisation of association for the support to victims, the role of associations of victims, crisis information telephone numbers, the family welcome centre, information meetings for victims and families, relationships with media. The second set concerns the post-crisis phase: coordination during the follow-up phase, the intervention of insurance providers, and the intervention of lawyers. A last sheet concerns the legal phase with a presentation of the legal procedure

  20. A revolution in food preservation

    International Nuclear Information System (INIS)

    1986-01-01

    A brief consumer guide to food irradiation is presented. Aspects covered include some of the advantages of food irradiation compared to other methods of food preservation, the type of radiation used, the mechanism of action, some practical applications, safety and future benefits. (UK)

  1. Hardcore Heritage: imagination for preservation

    NARCIS (Netherlands)

    Rietveld, E.; Rietveld, R.

    2017-01-01

    Should the practice of the historic preservation of built and landscape heritage necessarily be based on conservation? Monuments, listed buildings, landscapes, and other forms of built heritage, are typically regarded as immutable and untouchable—objects to be “conserved”—and as a result tend to

  2. 2007 Preserve America Presidential Awards

    Science.gov (United States)

    aviation history museum that emphasizes people and culture as well as technology and events. With a the Private Preservation category, the two winners are: The History Channel, Save Our History Save Our History were Abbe Raven, president and CEO, A&E Television Networks; and Nancy Dubuc

  3. Yeasts preservation: alternatives for lyophilisation

    NARCIS (Netherlands)

    Nyanga, L.K.; Nout, M.J.R.; Smid, E.J.; Boekhout, T.; Zwietering, M.H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts

  4. Beyond the Scope of Preservation?

    DEFF Research Database (Denmark)

    Rikke, Stenbro,; Riesto, Svava

    2014-01-01

    Why are some parts of the built environment protected as national heritage and others not? Listing is the most restrictive tool of Norwegian and Danish preservation in the built environment and creates a specific version of the past told through buildings and sites. The heritage authorities in both...

  5. College students' electronic victimization in friendships and dating relationships: anticipated distress and associations with risky behaviors.

    Science.gov (United States)

    Bennett, Diana C; Guran, Elyse L; Ramos, Michelle C; Margolin, Gayla

    2011-01-01

    This study investigated college students' reports of electronic victimization in friendships and dating relationships. We examined 22 items representing four categories of electronic victimization: hostility, humiliation, exclusion, and intrusiveness. Nearly all participants (92%) reported some electronic victimization in the past year, with males reporting more victimization and females anticipating more distress. Both females and males anticipated more distress from electronic victimization in dating relationships than friendships. More actual experience with electronic victimization related to lower anticipated distress. Electronic victimization was associated with females' alcohol use, even after controlling for other victimization experiences. Discussion focuses on the contextualized nature of electronic victimization, and on the importance of understanding what makes electronic victimization highly distressing for some individuals.

  6. Cyberbully and Victim Experiences of Pre-service Teachers

    OpenAIRE

    Nilgün Tosun

    2016-01-01

    The aim of this study was to determine the prevalence of different types of cyber bullying, the ways in which cyber bullying occurred, whether the identity of cyber bullies were known, and reaction to being cyber bullied among pre-service teachers. Relationships between gender and likelihood of being a cyber bully/victim were also investigated. Using a questionnaire based on the Cyber Bully and Victim Scale developed by [1], males were found to engage in cyber bullying more than females. Cybe...

  7. [Widows of victims of Nazi concentration camps: their pathology].

    Science.gov (United States)

    Ryn, Z J

    1992-09-01

    The psychosocial situation of widows and orphans of victims of the Nazi concentration camps in Poland are presented. In 1984, 74 widows of victims from the Auschwitz-Birkenau camp were interviewed. This article describes widows' emotional-behavioral reactions when facing the imprisonment and death of their husbands, their difficulties in adapting themselves to widowhood, different adaptative forms of memories of their married life, and consequences relevant to widows' mental health and family, and social consequences of widowhood.

  8. Victim empathy, social self-esteem, and psychopathy in rapists.

    Science.gov (United States)

    Fernandez, Yolanda M; Marshall, W L

    2003-01-01

    The purpose of the present study was to compare the responses of 27 incarcerated rapists and 27 incarcerated nonsexual offenders using the Rapist Empathy Measure (targeting victim specific empathy deficits) and to examine the relationship between empathy with self-esteem and psychopathy for both groups. The Social Self-Esteem Inventory was used as a measure of perceived social competence and the Psychopathy Checklist-Revised (PCL-R; Hare, 1991) was used as a measure of psychopathy. All participants completed the two self-report questionnaires on empathy and self-esteem; in addition, the rapists were required to complete an extra section of the empathy measure that assessed their empathic responses to their own victims. Demographic information and psychopathy scores were obtained by reviewing institutional files. When psychopathy scores were not available, subjects participated in a semi-structured interview and were scored on the Psychopathy Checklist-Revised by the researcher. Rapists demonstrated more empathy than the nonsexual offenders toward women in general and the same degree of empathy as the nonsexual offenders toward a woman who had been a victim of a sexual assault by another male. Of particular importance were the within-group comparisons across victim type for the rapists which revealed significant empathy deficits toward their own victim(s). Interestingly, no differences were found between the rapists and nonsexual offenders in terms of self-esteem and psychopathy, and neither self-esteem nor psychopathy significantly predicted empathy for either group. It was concluded from the present study that rapists may suppress empathy primarily toward their own victim rather than suffer from a generalized empathy deficit. It is suggested that empathy deficits in rapists might better be construed as cognitive distortions specific to their victims and should be addressed in that manner in treatment.

  9. Offer and Acceptance of Apology in Victim-Offender Mediation

    OpenAIRE

    Dhami, MK; Dhami, MK

    2012-01-01

    Past research on restorative justice (RJ) has highlighted the importance of apology for both victims and offenders and the prevalence of apology during the RJ process. The present study moves this work further by examining the nature of the apologies that are offered during victim-offender mediation, as well as the individual-, case-, and mediation-level factors that can affect the offer and acceptance of apology. In addition, we measure the implications that the offer and acceptance of apolo...

  10. Violence against women: featuring the victim, aggression and the author

    OpenAIRE

    Costa Leite, Franciele Marabotti; Universidade Federal do Espirito Santo; Bravim, Larissa Regina; Universidade Federal do Espirito Santo; Lima, Eliane de Fátima Almeida; Universidade Federal do Espirito Santo; Primo, Cândida Caniçali; Universidade Federal do Espirito Santo

    2015-01-01

    Objective: Describing the profile of violence against women regarding aggression, the socio-demographic characteristics of the victim and the perpetrator of the violence. Method: a transversal study of quantitative approach and descriptive analysis. The population consisted of 42 women victims of violence. Results: of the total 42 participants, prevailed in women aged 30-39 years old, with complete high school and family income of 1-3 minimum wages. The physical, psychological and moral viole...

  11. The role and importance of victim surveys in criminal research

    OpenAIRE

    Ahmet Polat; Serdar Kenan Gül

    2010-01-01

    Due to increasing crime rates, insufficient policies and the limitations of the official statistics, victim surveys are being used as an alternative crime measurement technique. These types of surveys are inspired most of the criminological theories and regarded as a data source especially in shaping the crime policies of the Anglo-Saxon countries. Even though they have developed over time, victim surveys have limitations which create an obstacle in measuring crime. However, these surveys cou...

  12. Peer Victimization and Internalizing Symptoms in Middle School Children

    OpenAIRE

    Grills, Amie E.

    2000-01-01

    The primary purpose of this investigation was to examine the relationships among peer victimization, global self-worth, social support, and internalizing behaviors (e.g., anxiety, social anxiety, and depression). Of particular interest were the potential mediating and moderating roles of global self-worth and social support in the anticipated relationships between peer victimization and internalizing symptoms. All sixth grade children from a public middle school completed self-report measur...

  13. Physical examination of sexual assault victims in Belgrade area

    Directory of Open Access Journals (Sweden)

    Alempijević Đorđe

    2006-01-01

    Full Text Available Introduction: Sexual crimes represent various forms of contact of perpetrator’s genitals, lips, tongue, and fingers with genitals, lips and/or anus of the victim, in order to achieve sexual satisfaction, without victim’s consent. Objective: The aim of this work was to analyze the type of medical institution in which victims of sexual assaults are being examined in Belgrade area, to assess the quality of these examinations and medical records, as well as to control whether standardized protocols are followed. Method: Data were obtained through analysis of 113 cases of sexual assaults prosecuted in the District Court of Belgrade. Results: All victims were females with mean age of 24.1 years. The majority of victims (85% were examined in one medical institution, most often in the Institute of Gynecology and Obstetrics, Clinical Center of Serbia, and only by one medical doctor (81.4%. Gynecologists were most frequently included in examination, while specialists of forensic medicine were engaged in only 9 cases (7.9%. In 84% of victims, the examination was performed during the first three days after the assault, and in 52% of cases on the first day. Standard techniques of clinical and gynecological examinations were applied only, without following any protocols, so the reports were made exclusively on individual basis. In no case an informed consent by victim was obtained before examination. Anamnestic data were collected in only 15.9% of cases, and they were generally incomplete. Conclusion: The results of investigation show that the quality of examination of sexual assault victims in Belgrade area is not adequate. Therefore, such negative practice should be changed in future through introduction of standardized protocols for examination of victims, as well as development of clinical forensic medicine.

  14. Clinical observations over 20 years period of Bikini victims

    International Nuclear Information System (INIS)

    Kumatori, Toshiyuki

    1976-01-01

    The author outlined the results of medical examinations performed in a period of 20 years on the Japanese fishermen who were exposed at Bikini in 1954. Exposure doses were estimated, and the progress of medical examinations for skin injury, hematological changes, cytogenetic changes, and spermatogenetic disturbance was described. In view of internal exposure, none of the long half-life nuclides was retained in the body. The victims were compared with the victims exposed in Marshall Islands. (Serizawa, K.)

  15. Emotional Profile of Women Victims of Domestic Violence.

    Science.gov (United States)

    Avdibegovic, Esmina; Brkic, Maja; Sinanovic, Osman

    2017-06-01

    Research indicates that women victims of domestic violence show significant cognitive changes, emotional numbing, and avoidance of interpersonal relationships. The aim of this research was to analyze emotional profile of women victims of domestic violence, and to determine the relationship between dimensions of emotions and frequency of women exposure to domestic violence. The research was conducted on the sample of 169 women, 111 were victims of domestic violence and 58 were women who did not experience domestic violence. Plutchik's Emotions Profile Index (EPI) was used for measuring of the emotion profile, and the Modified Inventory of Domestic Violence for measuring experiences of different types of violence. Basic socio-demographic data were also collected. Significant differences between women victims of domestic violence and women who did not experience domestic violence were found in a few dimensions of emotional profile. Women victims of domestic violence had higher results in the dimensions of deprivation/depression and aggression/destruction, while women who did not experience domestic violence had higher results in dimensions of reproduction and incorporation. Aggression was in significant negative correlation with reproduction, incorporation and self protection, whereas it was significant positive correlation with deprivation and opposition. There were significant and positive correlation between the dimensions of aggression and deprivation and frequency of all three forms of domestic violence and age of women. According to results obtained in this research, it can be concluded that women victims of domestic violence have significantly more intensive negative emotional dimensions in comparison to women who were not abused. Women victims of domestic violence with higher frequency of abuse describe themselves as more sad, apathetic, lonely, angry, quarrelsome and less sociable. Prominence of negative emotions, deprivation and aggression, can be factor of

  16. KT Fund: Five years of funding for impact

    CERN Multimedia

    CERN Bulletin

    2015-01-01

    Cryogenic safety, ion beam therapy, event management for communities, emergency lighting… this year’s applications for funding through the Knowledge Transfer Fund demonstrate the breadth of possible applications of CERN technology beyond high-energy physics.     The use of high index glass spherical targets as retroreflectors for a 3D interferometer is the subject of one of the 2015 KT Fund Projects.   Following the 2015 selection committee held in January, the KT Fund has funded a total of seven new projects that aim to further develop CERN technologies to a level where they can be transferred and subsequently make a positive impact on society. “CERN’s ambitious scientific programme requires state-of-the-art technologies that are not always directly reusable by society because they were not designed with this purpose in mind,” explains David Mazur, Section Leader of the IP Dissemination Section. “Since 2011, the KT...

  17. Integrating forensic anthropology into Disaster Victim Identification.

    Science.gov (United States)

    Mundorff, Amy Z

    2012-06-01

    This paper will provide mass fatality emergency planners, police, medical examiners, coroners and other Disaster Victim Identification (DVI) personnel ways to integrate forensic anthropologists into DVI operations and demonstrate how anthropological contributions have improved DVI projects. In mass disaster situations, anthropologists have traditionally been limited to developing biological profiles from skeletal remains. Over the past decade, however, anthropologists' involvement in DVI has extended well beyond this traditional role as they have taken on increasingly diverse tasks and responsibilities. Anthropological involvement in DVI operations is often dictated by an incident's specific characteristics, particularly events involving extensive fragmentation, commingling, or other forms of compromised remains. This paper will provide examples from recent DVI incidents to illustrate the operational utility of anthropologists in the DVI context. The points where it is most beneficial to integrate anthropologists into the DVI process include: (1) during recovery at the disaster scene; (2) at the triage station as remains are brought into the mortuary; and (3) in conducting the reconciliation process. Particular attention will be paid to quality control and quality assurance measures anthropologists have developed and implemented for DVI projects. Overall, this paper will explain how anthropological expertise can be used to increase accuracy in DVI while reducing the project's cost and duration.

  18. The happy victimizer phenomenon: Not found here

    Directory of Open Access Journals (Sweden)

    Jevtić Ana

    2014-01-01

    Full Text Available Children’s attribution of emotions to a moral transgressor is an important research topic in the psychology of moral and emotional development. This is especially because of the so-called Happy Victimizer Phenomenon (HVP where younger children attribute positive emotions to a moral transgressor described in a story. In the two studies that we have conducted (children aged 5, 7 and 9, 20 of each age; 10 of each age in the second study we have tested the possible influence of the fear of sanctions and the type of transgression (stealing and inflicting body injuries on the attribution of emotions. Children were presented with stories that described transgressions and they were asked to answer how the transgressor felt. The fear of sanctions did not make a significant difference in attribution but the type of transgression did - more negative emotions were attributed for inflicting body injuries than for stealing. Positive emotions were explained with situational-instrumental explanations in 84% of cases while negative emotions were explained with moral explanations in 63,5%. Girls attributed more positive emotions (61% than boys (39%. However, our main finding was that, for the aforementioned age groups, we did not find the HVP effect although it has regularly been registered in foreign studies. This finding denies the generalizability of the phenomenon and points to the significance of disciplining styles and, even more so, culture for children’s attribution of emotions to moral transgressors.

  19. Status of funded actions

    International Nuclear Information System (INIS)

    2004-01-01

    The GEDEPEON workshop is organised to review the GEDEPEON research actions, which have been funded in 2003. Presentations are made by research teams actively involved in GEDEPEON research areas. Speakers were invited to show how the presented research data are related to the general goals of transmutation, for which 2006 is an important milestone, and innovative systems. document gathers the slides of 9 presentations among the 19 given at this workshop: 1 - nuclear and physical data: the TRADE experiment (Steckmeyer J.C.); actinides incineration - Mini-Inca (Chabod S.); NTOF: measurement of capture cross-sections (Gunsing F.); 2 - systems: analysis of uncertainties and sensitivity factors of nuclear data in molten salt reactor concepts (Mastrangelo V.); 3 - targets and corrosion: diffusion-controlled intergranular penetration and embrittlement of metals by liquid bismuth (Wolski K.), behaviour of T91 steel under cyclic loading in the liquid Pb-Bi alloy (Verleene A.); 4 - materials for future systems: helium impurities corrosion resistance of high temperature resistant materials for gas-cooled reactors (Cabet, C.); 5 - accelerators: Spoke cavities R and D and their role in the driver of an accelerator-driven system (ADS) (Junquera T.); 6 - Gedeon-Gedepeon 2001-2004 synthesis: spallation and nuclear data (Tassan-Got L., Barreau G. and Leray S.). (J.S.)

  20. Funding stalls ARETS work

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    The current status of the Lethbridge Alberta Renewable Energy Test Site (ARETS) was described, following the Alberta Energy Department's failure to respond to the funding application of the Test Site. This forced the facility to be inactive for its 1997 field season. The site was established in 1982 to evaluate and demonstrate wind turbines for water pumping. It now includes solar and deep well pumping systems, and also wind-powered aeration. Up to now the site has been jointly financed by Alberta Energy and Natural Resources Canada. Both departments wanted ARETS to put more emphasis on research and development and on helping manufacturers commercialize their ideas. Despite the inactivity during the 1997 field season, one small project managed to continue, i.e., the wind project involving testing the new Delta Junior water-pumper by Dutch Industries. The Centre will also be working on a new submersible pump and DC motor system. For long-term survival, the Centre needs the support of its major financial backers. 1 fig

  1. Sexual violence against children: authors, victims and consequences.

    Science.gov (United States)

    Platt, Vanessa Borges; Back, Isabela de Carlos; Hauschild, Daniela Barbieri; Guedert, Jucélia Maria

    2018-04-01

    The scope of this study was to identify the characteristics of sexual abuse against children including the profiles of the victims and the perpetrators, and associated factors notified in a health service of reference with the database of the Brazilian Case Registry Database, in a city in the south of Brazil. Categorical variables are presented in prevalence with 95% confidence intervals. There were 489 notifications from 2008 to 2014 of confirmed or suspected child sexual abuse. The majority was related to female victims, but the repeated abuse was reported mainly with male victims. In most cases, the abuse took place at the victims' or perpetrators' homes and the main perpetrators of abuse were male and acquainted with the victims. Twelve victims have contracted sexually transmitted infections; pregnancies were six, five of them legally terminated. This study highlights that the child sexual abuse profiles were similar in almost all of Brazilian regions, showing that it is possible to have a coordinated national action to prevent this offence.

  2. Extracorporeal Detoxification in Victims with Severe Concomitant Injury

    Directory of Open Access Journals (Sweden)

    S. Ye. Khoroshilov

    2009-01-01

    Full Text Available Objective: to improve the results of victims with massive crushes of soft tissues in severe concomitant injury (SCI, by applying extracorporeal detoxification techniques as soon as possible. Subjects and methods. The results of examination and treatment were studied in 41 victims with SCI treated at the N. N. Burdenko Main Military Clinical Hospital in 2006 to 2008. In the early posttraumatic period (on days 1—3, all the victims (n=41 were divided into 2 groups. Group 1 victims (n=19 underwent hemodiafiltration (HDF with replacement at 35 ml/kg/hr; Group 2 (n=22 had plasmapheresis. Results. Early HDF applied to Group 1 victims could achieve 32, 44, and 37% reductions in the elevated levels creatine phosphokinase, myoglobin, and middle-sized molecules, respectively. In Group 2, plasmapheresis showed a lower effect (19, 25, and 26% reductions. Furthermore, there was a decrease in total protein in Group 1, which was absent in Group 2. Conclusion. The timely use of extracorporeal detoxification techniques in victims with massive crushes of soft tissues in the early posttraumatic period prevents the development of fatal complications of SCI, at the same time HDF is more effective and safe than plasmapheresis. Key words: severe concomitant injury, rhabdomyolysis, myoglobin, plasmapheresis, hemodiafiltration.

  3. Familial Influences on Dating Violence Victimization Among Latino Youth.

    Science.gov (United States)

    Reyes, H Luz McNaughton; Foshee, Vangie A; Klevens, Joanne; Tharp, Andra Teten; Chapman, Mimi V; Chen, May S; Ennett, Susan T

    2016-01-01

    Despite theoretical and empirical evidence suggesting that the family environment plays a central role in Latino youth development, relatively little is known about how family processes influence dating violence victimization among Latino adolescents. To address this gap in the literature, we used data from 210 Latino parents and their 13- to 15-year-old adolescents to examine associations between several different family processes, including both parenting practices (parent monitoring, parent-adolescent communication) and aspects of the family relational climate (family cohesion, family conflict, acculturation conflict) and psychological, physical, and sexual dating violence victimization. Consistent with expectations, lower levels of family cohesion and higher levels of family and acculturation conflict were associated with risk for dating violence victimization, although associations varied depending on victimization type. In contrast, neither parental monitoring nor parent-adolescent communication was significantly associated with any type of dating violence victimization. In addition, we found that parent, but not teen, Anglo-American acculturation was associated with higher dating violence victimization risk. Findings suggest that family-based dating abuse prevention programs for Latino youth should seek to increase family cohesion and decrease family conflict, including acculturation-based conflict.

  4. Hybrid Food Preservation Program Improves Food Preservation and Food Safety Knowledge

    Science.gov (United States)

    Francis, Sarah L.

    2014-01-01

    The growing trend in home food preservation raises concerns about whether the resulting food products will be safe to eat. The increased public demand for food preservation information led to the development of the comprehensive food preservation program, Preserve the Taste of Summer (PTTS). PTTS is a comprehensive hybrid food preservation program…

  5. The Voiceless Victim: A critical analysis of the impact of enhanced victim participation in the criminal justice process

    Directory of Open Access Journals (Sweden)

    Sarah Moynihan

    2015-12-01

    Full Text Available In contrast to many European jurisdictions, the victim of an alleged crime in England, Wales and Northern Ireland is denied any form of meaningful participation at the trial stage of the criminal justice process. This is by reason of the unyielding structure of the Anglo-American adversarial system, which facilitates a dispute between two parties only - the prosecution, acting on behalf of the collective public interest and the defence. In recent years, however, the victims’ movement has gained momentum as advocates of victims’ rights have been engaged in an impassioned campaign to enhance the participatory rights of victims in the criminal justice process. Fervent arguments have been articulated pertaining to the value of various forms of victim input. This paper cogitates some of these arguments and critically evaluates how enhanced victim participation in the criminal justice process has the potential to undercut the integrity of the Anglo- American adversarial system; a system with objective adjudication at its core.

  6. Social support improves mental health among the victims relocated to temporary housing following the Great East Japan Earthquake and Tsunami.

    Science.gov (United States)

    Koyama, Shihoko; Aida, Jun; Kawachi, Ichiro; Kondo, Naoki; Subramanian, S V; Ito, Kanade; Kobashi, Gen; Masuno, Kanako; Kondo, Katsunori; Osaka, Ken

    2014-11-01

    The victims of the Great East Japan Earthquake and Tsunami have been forced to live in temporary housing, mainly by two different methods of resettlement: group allocation that preserved pre-existing local social ties and lottery allocation. We examined the effects of various factors, including the resettlement methods and social support, on mental health. From February to March 2012, we completed a cross-sectional survey of 281 refugees aged 40 years or older, who had lost their homes in the tsunami and were living in temporary housing in Iwanuma city. Psychological distress of the victims was assessed using the Kessler Psychological Distress Scale (K6) that consists of six self-reported items. Participants were also asked whether they had provided or received social support during this time. Participants were categorized as "providing social support" if they listened to someone else's concerns and complaints, or "receiving social support" if they have someone who listened to their concerns and complaints. After adjusting for age and sex, multiple log-binomial regression analysis showed that participants without social support had a higher risk of psychological distress. Group allocation victims were more likely to receive social support than those who underwent lottery allocation. However, the resettlement approach did not significantly correlate with distress. Other factors associated with a higher risk of psychological distress were a younger age (55 or younger), living with either 3 people or 6 or more people, and having a lower income. The present results suggest that social support promotes the mental health of disaster victims.

  7. Drug Revolving Fund-Based

    African Journals Online (AJOL)

    Background: The Drug Revolving Fund (DRF) was instituted in 1996 in Oyo State to ensure sustainable drug availability at primary health care level with a seed stock of drugs supplied by the Petroleum Trust Fund. This was discontinued in 1999 and replaced in January 2000, with free health service, which involves ...

  8. Adequacy Model for School Funding

    Science.gov (United States)

    Banicki, Guy; Murphy, Gregg

    2014-01-01

    This study considers the effectiveness of the Evidence-Based Adequacy model of school funding. In looking at the Evidence-Based Adequacy model for school funding, one researcher has been centrally associated with the development and study of this model. Allen Odden is currently a professor in the Department of Educational Leadership and Policy…

  9. [AIDS: the economy a victim of the epidemic].

    Science.gov (United States)

    1989-12-11

    A recent World Bank report on development prospects in sub-Saharan Africa over the next decade contained analyses based on projected rapid population growth which failed to take into account the mortality and morbidity of AIDS. Since 1960 the annual rate of population growth for the sub-Saharan African population has increased from 2.5%-3.23%. The number of inhabitants has doubled since 1965 and may double again to 1 million by the year 2010. The World Bank recommended classic and relatively inexpensive measures to meet the challenge of population growth. The governments concerned should devote .8% of their gross national products to family planning programs and manpower training. The spread of AIDS however is likely to reduce population growth. 2 specialists concluded for example that demographic growth in Uganda will decline from 3.25% to -2.4% annually by 2020, with average life expectancy declining from 52 to 24 years. The figures must be interpreted cautiously because their statistical basis is imprecise. World Health Organization figures published in June 1989 showed only 24,886 of the 157,191 reported cases of AIDS as occurring in Africa. But in urban zones of some parts of Africa from 20-30% of the sexually active population is estimated to be infected. Some experts predict that during the 1990s AIDS will kill 300,000-1.5 million Africans. The World Bank report scarcely mentions AIDS. Although AIDS has fewer victims than dysentery, malaria, or tuberculosis, its economic impact is greater because it strikes the working age population. Policies to control HIV infections and AIDS run the risk of reducing funds available for economic investment. Increasing expenditures on medical treatment and hospitalization in household as well as government budgets will be made to the detriment of other priorities. Policies to prevent AIDS must be put into place so that this economic disaster can be averted. Information and distribution of condoms have become longterm

  10. Low-level efficacy of cosmetic preservatives

    DEFF Research Database (Denmark)

    Lundov, M D; Johansen, J D; Zachariae, C

    2011-01-01

    Preservation using combinations of preservatives has several advantages. This study shows that the concentration of some of the most frequently used allergenic preservatives can be markedly lowered when they are combined with phenoxyethanol. The antimicrobial efficacy of cosmetic preservatives...... of the preservatives indicated additive effects against the microorganisms. No combination of preservatives showed any inhibitory action on each other. Challenge tests with different concentrations and combinations were performed in a cosmetic cream. Diazolidinyl urea and MCI/MI alone were ineffective against C....... albicans in a challenge test at concentrations up to 16 times higher than the observed MIC values. When combining phenoxyethanol with either one of the allergenic preservatives diazolidinyl urea, MCI/MI or MI, the cosmetic cream was adequately preserved at concentrations well below the preservatives' MIC values as well...

  11. Decommissioning Funding: Ethics, Implementation, Uncertainties

    International Nuclear Information System (INIS)

    2007-01-01

    This status report on decommissioning funding: ethics, implementation, uncertainties is based on a review of recent literature and materials presented at NEA meetings in 2003 and 2004, and particularly at a topical session organised in November 2004 on funding issues associated with the decommissioning of nuclear power facilities. The report also draws on the experience of the NEA Working Party on Decommissioning and Dismantling (WPDD). This report offers, in a concise form, an overview of relevant considerations on decommissioning funding mechanisms with regard to ethics, implementation and uncertainties. Underlying ethical principles found in international agreements are identified, and factors influencing the accumulation and management of funds for decommissioning nuclear facilities are discussed together with the main sources of uncertainties of funding systems

  12. Funding emergency care: Australian style.

    Science.gov (United States)

    Bell, Anthony; Crilly, Julia; Williams, Ged; Wylie, Kate; Toloo, Ghasem Sam; Burke, John; FitzGerald, Gerry

    2014-08-01

    The ongoing challenge for ED leaders is to remain abreast of system-wide changes that impact on the day-to-day management of their departments. Changes to the funding model creates another layer of complexity and this introductory paper serves as the beginning of a discussion about the way in which EDs are funded and how this can and will impact on business decisions, models of care and resource allocation within Australian EDs. Furthermore it is evident that any funding model today will mature and change with time, and moves are afoot to refine and contextualise ED funding over the medium term. This perspective seeks to provide a basis of understanding for our current and future funding arrangements in Australian EDs. © 2014 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  13. Funding oil and gas ventures

    International Nuclear Information System (INIS)

    Billingsley, L.T.

    1992-01-01

    This paper is addressed to geologists who must raise external funds for prospect acquisition, exploratory and development drilling, or to a limited extent, production acquisition. In the ranks of independent geologists, external funding is what separates a dreamer with a good idea from a successful oil and gas producer who gets ideas evaluated on a regular basis. The quantity of external funding usually dictates the level of drilling activity for independent geologists and small companies. Companies or individuals with high levels of internal cash flow set budgets to determine their drilling activity. The purpose of this paper is to provide an independent geologist with an overview of raising external funding. The scope is purposely general. The real motivation behind this paper is not to provide a cookbook for selling prospects. Instead, the author hopes to stimulate geologists to become students of salesmanship and thereby increase the effectiveness of their fund

  14. Random matrix theory and fund of funds portfolio optimisation

    Science.gov (United States)

    Conlon, T.; Ruskin, H. J.; Crane, M.

    2007-08-01

    The proprietary nature of Hedge Fund investing means that it is common practise for managers to release minimal information about their returns. The construction of a fund of hedge funds portfolio requires a correlation matrix which often has to be estimated using a relatively small sample of monthly returns data which induces noise. In this paper, random matrix theory (RMT) is applied to a cross-correlation matrix C, constructed using hedge fund returns data. The analysis reveals a number of eigenvalues that deviate from the spectrum suggested by RMT. The components of the deviating eigenvectors are found to correspond to distinct groups of strategies that are applied by hedge fund managers. The inverse participation ratio is used to quantify the number of components that participate in each eigenvector. Finally, the correlation matrix is cleaned by separating the noisy part from the non-noisy part of C. This technique is found to greatly reduce the difference between the predicted and realised risk of a portfolio, leading to an improved risk profile for a fund of hedge funds.

  15. Status of funded actions

    International Nuclear Information System (INIS)

    2003-01-01

    The GEDEPEON status workshop is organised to review the GEDEPEON research actions, which have been funded in 2003. Presentations are made by research teams actively involved in GEDEPEON research areas. Speakers were invited to show how the presented research data are related to the general goals of transmutation, for which 2006 is an important milestone, and innovative systems. This document gathers 18 presentations (slides) among the 32 given at this workshop and dealing with: 1 - nuclear data: measurement of cross-sections of neutron induced reactions at the nTof time of flight facilities of CERN and of Gelina at Geel (F. Gunsing), study of (n,xn) reactions thanks to prompt gamma spectroscopy (M. Kerveno), iodine 129 cross-sections (G. Noguere); 2 - reactor physics/cycles: CEA-CNRS scenarios (F. Varaine, D. Heuer), analysis of uncertainties and sensitivity factors of nuclear data on innovative systems (molten-salt reactors) (A. Bidaud); 3 - materials: contribution to the study of T91 steel fatigue by lead-bismuth (D. Gorse), kinetics and mechanisms of fatigue by liquid metals (V. Laporte), studies of molten salts corrosion in future reactors (S. Sanchez), stress-induced fatigue by liquid metal (A. Verleene), thermodynamic study of the Bi-Fe-Hg-O-Pb quinary system (A. Maitre), synchrotron imaging study of fatigue by liquid metals (D. Bellet); 4 - future systems: molten salts reprocessing strategy - impact on the molten salt reactors neutronics (L. Mathieu), microscopy technique for the characterization of the thermal properties of inert materials for gas-cooled reactors (L. David), modeling and application of sub-atomic phenomena (J. Maillard), forecasting of the chemical compatibility between fissile compounds and inert materials in future high temperature reactors using a thermodynamical approach (A. Maitre), hydrogen production by thermochemical cycles (S. Colette), development of Ni-W refractory alloys for high temperature and molten salts reactors (J

  16. Frequency of victimization experiences and well-being among online, offline and combined victims on social online network sites of German children and adolescents

    Directory of Open Access Journals (Sweden)

    Michael eGlüer

    2015-12-01

    Full Text Available Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,906 German children and adolescents (grades 5 to 10, mean age = 13.9; SD = 2.1 with and without offline or online victimization experiences who participated in a social online network (SNS. Online questionnaires were used to assess previous victimization (offline, online, combined, and without, somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others. In total, 1,362 (71.4% children and adolescents reported being a member of at least one social online network, and 377 students (28.8% reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%, whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  17. Frequency of Victimization Experiences and Well-Being Among Online, Offline, and Combined Victims on Social Online Network Sites of German Children and Adolescents.

    Science.gov (United States)

    Glüer, Michael; Lohaus, Arnold

    2015-01-01

    Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,890 German children and adolescents (grades 5-10, mean age = 13.9; SD = 2.1) with and without offline or online victimization experiences who participated in a social online network (SNS). Online questionnaires were used to assess previous victimization (offline, online, combined, and without), somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others). In total, 1,362 (72.1%) children and adolescents reported being a member of at least one SNS, and 377 students (28.8%) reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%), whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined) was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  18. The happy victimizer phenomenon: Thinking or knowledge

    Directory of Open Access Journals (Sweden)

    Simunović Vojin

    2015-01-01

    Full Text Available The attribution of emotions to transgressors has received considerable attention of researchers since the end of the1980s. A common research finding in the Western countries (the USA, Germany, and Portugal is that children younger than 8 years attribute positive emotions to transgressors (which is called “the happy victimizer phenomenon”, HVP. On the other hand, a research study conducted in Belgrade, Serbia, did not find the HVP even among 5-year-old children. It was established that children from Belgrade focused more on the moral side of the transgression than on the instrumental side (i.e. the things that the transgressor achieved by the transgression. The goal of our research was to evaluate whether Serbian children actually reason in this way or simply repeat what they have learned. In order to verify this hypothesis, Piaget’s method of “a pair of stories” (instead of presenting the stories one by one was used in two studies. In the first study, the degree of injury inflicted to the other child was varied (as one aspect of the moral side of the transgression. In the second study, the type of intention (good or bad was varied (as another aspect of the moral side of the transgression. In both studies, the sample consisted of 40 children, with two age groups (5- and 7-year-old children that included 20 children each (10 boys and 10 girls. The conclusion of both studies was that subjects attributed negative emotions to transgressors in accordance with the moral instead of instrumental understanding of the transgression. These findings imply that children’s responses do not represent moral knowledge, but reflect authentic moral reasoning.

  19. Orbital preservation in a maxillectomy

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi [Sapporo National Hospital (Japan)

    1999-07-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au{sup 198}) thus appeared to be a useful tool for further preserving the eye. (author)

  20. Orbital preservation in a maxillectomy

    International Nuclear Information System (INIS)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi

    1999-01-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au 198 ) thus appeared to be a useful tool for further preserving the eye. (author)