WorldWideScience

Sample records for viral attack victims

  1. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  2. Acute stress disorder in hospitalised victims of 26/11-terror attack on Mumbai, India.

    Science.gov (United States)

    Balasinorwala, Vanshree Patil; Shah, Nilesh

    2010-11-01

    The 26/11 terror attacks on Mumbai have been internationally denounced. Acute stress disorder is common in victims of terror. To find out the prevalence and to correlate acute stress disorder, 70 hospitalised victims of terror were assessed for presence of the same using DSM-IV TR criteria. Demographic data and clinical variables were also collected. Acute stress disorder was found in 30% patients. On demographic profile and severity of injury, there were some interesting observations and differences between the victims who developed acute stress disorder and those who did not; though none of the differences reached the level of statistical significance. This study documents the occurrence of acute stress disorder in the victims of 26/11 terror attack.

  3. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud A.M.G.; Nieuwenhuis, Lambertus Johannes Maria

    2017-01-01

    DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS)

  4. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus in Australia.

    Directory of Open Access Journals (Sweden)

    Yusuke Fukuda

    Full Text Available Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal by saltwater crocodiles (Crocodylus porosus in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading had a higher risk than on-water (boating or on-land (fishing, and hunting near the water's edge positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81 if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17 with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05 regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7% involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg than that of crocodiles that killed adults (450 cm, 324 kg during the same period (2006-2014. These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  5. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    Science.gov (United States)

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  6. No health service able to care for victims of nuclear attack

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    According to the article the chances of victims of a nuclear attack receiving medical attention are very small. Possible effects of a nuclear explosion are discussed, including: the collapse of the social order, cancer and other diseases, as well as psychological stress

  7. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  8. Can the Pelargonium sidoides root extract EPs® 7630 prevent asthma attacks during viral infections of the upper respiratory tract in children?

    Science.gov (United States)

    Tahan, Fulya; Yaman, Melih

    2013-01-15

    Asthma is a chronic disease characterized by airway inflammation. Viral infection initiates an immune inflammatory response that may produce asthma attacks. There is no effective preventing therapy for asthma attack during upper respiratory tract viral infections. To investigate the efficacy of 5 days of Pelargonium sidoides therapy for preventing asthma attack during upper respiratory tract viral infections. Sixty one asthmatic children with upper respiratory tract viral infection were enrolled in the study. The patients were randomized to receive Pelargonium sidoides daily for 5 days (n=30) or not (n=31). Before and after treatment, they all were examined and symptom scores were determined. Following five days treatment, children were evaluated whether or not they had an asthma attack. Treatment with Pelargonium sidoides was not associated with a statistically significant differences in fever and muscle aches (p>0.05, Chi-square test). There were significant differences in cough frequency and nasal congestion between the groups (pasthma attack between the groups (pasthma attack. Our study shows that Pelargonium sidoides may prevent asthma attacks during upper respiratory tract viral infections. Copyright © 2012 Elsevier GmbH. All rights reserved.

  9. [Defusing of victims of the terrorist attacks in Paris. Elements of assessment one-month post-event].

    Science.gov (United States)

    Prieto, N; Cheucle, E; Faure, P; Digard, F; Dalphin, C; Pachiaudi, V; Simond, M; Darbon, R; Collinet, C; Habibi, R; Gueugniaud, P-Y

    2018-04-01

    The terrorist attacks (fusillades and suicide attacks) in Paris on 13 November 2015 have had a major psychic impact on all individuals directly or secondarily exposed to them. Medico-psychological unit (CUMP) of the Paris Île-de-France region's immediate care services were immediately mobilized and rapidly strengthened by all regional medico-psychological units (CUMP) throughout the country. Psychological assistance has been provided in several key points of Paris and specifically in the 11th district City Hall of Paris where Lyon's Medico-psychological unit was located. These specific immediate psychological assistances, referred to as a "defusing process" by the medico-psychological unit (CUMP), are mostly devoted to provide the victims with an entry point to a psychological healthcare relationship and give them a first sense of soothing and relief even though they do not prevent further psychological care follow up for the victims. Nonetheless, the potential therapeutic effect of this "defusing process" has not yet been sufficiently established nor demonstrated by any scientific study. A phoning survey was carried out one-month post-terrorist attacks and interviewed the 129 victims who benefited from the "defusing process" conducted by Lyon's medico-psychological unit (CUMP) in order to collect data and assess its effects. These people, whether directly exposed, bereaved relatives or witnesses, whose average age is 35, are mostly living in the Île-de-France region. Most of them present a high score on the IES-R scale, whether they were directly exposed, bereaved relatives or witnesses. Almost all of them (96.5%) experienced at least one medical care contact within this one-month post-trauma period with psychotropic medication for 37% of them. Regarding the defusing conducted by Lyon's medico-psychological unit (CUMP) in the 11th district City Hall of Paris, it appears that 93% of the victims who were looked after indicated that they were satisfied and 87.4% of

  10. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  11. The relation of innate and adaptive immunity with viral-induced acute asthma attacks: Focusing on IP-10 and cathelicidin.

    Science.gov (United States)

    Arikoglu, T; Akyilmaz, E; Yildirim, D D; Batmaz, S B; Ulger, S T; Aslan, G; Kuyucu, S

    Despite growing evidence suggesting potential association between innate and adaptive immunity in viral-induced acute asthma, there is paucity of data in this area. This study aimed to investigate the association of innate and adaptive immunity with acute asthma attacks by analysing the role of IFN-γ-inducible protein 10 (IP-10), TLR2, cathelicidin, vitamin D and cytokines. This prospective study included 33 patients with viral-induced acute asthma and 30 children with controlled asthma. Nasopharyngeal swab samples were collected for virus identification and asthma attack scores assessed in acute asthma group. Blood sampling for IP-10, TLR2, cathelicidin, vitamin D levels, and spirometric indices were employed. Serum IP-10 and cathelicidin levels of acute asthma group were significantly higher and vitamin D levels were lower than controlled asthma group (IP-10; p=0.006, cathelicidin; p=0.002, vitamin D; pasthma attack severity (p=0.03) in acute asthma group. Higher cathelicidin values showed significant positive relation to IP-10 (beta coefficient: 33, p=0.02). Serum IP-10 levels higher than 38.9pg/ml (sensitivity: 85%, specificity: 47%, p=0.002) were predictive of virus-induced asthma. Serum IP-10 and vitamin D levels were found to be significantly related to viral-asthma attacks (IP-10; aOR: 8.93, p=0.03 and vitamin D; aOR: 0.82, p=0.001). Innate immunity biomarkers such as serum IP-10 and cathelicidin can be used to predict viral-induced acute asthma. These biomarkers may provide potential new treatment targets for acute asthma. Copyright © 2016 SEICAP. Published by Elsevier España, S.L.U. All rights reserved.

  12. Forgiveness, coping, and terrorism: do tendency to forgive and coping strategies associate with the level of posttraumatic symptoms of injured victims of terror attacks?

    Science.gov (United States)

    Weinberg, Michael; Gil, Sharon; Gilbar, Ora

    2014-07-01

    The study examined the tendency to forgive (self, others, and situations) and coping strategies (problem-focused, emotion-focused, and avoidance) among terror attack victims as associated with posttraumatic stress disorder (PTSD) symptom severity. The sample included 108 terror victims who had been injured in terror attacks (mean age 46.23, standard deviation = 11.61; 58.3% male). Participants agreed to undergo assessments of their PTSD symptoms, coping strategies, and tendency to forgive. A nested structural equation model design showed that tendency to forgive is positively associated with problem-focused coping and negatively associated with avoidance coping. Additionally, tendency to forgive and problem-focused coping are associated with decreased PTSD symptom severity, whereas emotion-focused coping is associated with elevated PTSD symptom severity. Tendency to forgive and coping strategies are significantly associated with each other and with severity of PTSD symptoms among individuals injured in terror attacks. Theoretical and clinical implications of the findings are discussed. © 2013 Wiley Periodicals, Inc.

  13. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    Science.gov (United States)

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  14. Investigating the Self-Protective Potential of Immobility in Victims of Rape.

    Science.gov (United States)

    de Heer, Brooke A; Jones, Lynn C

    2017-04-01

    Using a nationwide sample of reported rape cases collected by the Federal Bureau of Investigation (FBI; 389 victims; 89% stranger rapes), this study investigates assumptions about self-protective behaviors for rape victims. Past research on victim resistance strategies often specifies active resistance as self-protective, inadvertently underestimating the potential for biologically based reactions, such as tonic immobility, to be self-protective as well. Results confirm that rape victims who were verbally and physically immobile during the attack were less likely to be injured and have force used against them. In addition, victims who were verbally immobile suffered a less severe attack. The results indicate that immobility may protect the victim from increased injury, force, and severity of the attack. Implications for the legal and public definition of consent are discussed.

  15. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  16. [From acute victimization at chronic victimization: socio-cognitive approach of differential tolerance threshold].

    Science.gov (United States)

    Forte, M; Przygodzki-Lionet, N; Masclet, G

    2006-01-01

    Work, for many years reduced to a purely instrumental dimension, proves to be a true microcosm of society, with its informal modes, its emotional networks and its series of evils and dilemmas. This human apprehension of the professional sphere tends to reveal a pole with multiple facets, some of which have long been concealed, but whose individual, social and economic extent can't let people ignore them. This social perception, which contributes to regard work as sacred and makes it impervious to any aggression, should be abandoned. Bearing this in mind, our study endeavours to show that "work" and "victim" are far more overlapping than antagonistic realities; it aims at determining the impact of two aggressive methods via the professional pole, namely: moral harassment at work and armed attacks within bank premises. Such an approach tends to unify health psychology, occupational psychology and victimology, thus opening a breach in the stereotyped view which crystallizes the professional sphere into a kind of representative noose devoid of the most human bases. We then suggest, as a first hypothesis, that the nature of the victimization process, resulting from specific aggressive scenarios, would determine different psychological, physiological and relational consequences, apprehended under the generic expression of tolerance threshold. In other words, "mobbing", through its proactive, intentional and obsessional dimension would tend to lower the victims' threshold more than hold-ups, which are characterized by a reactive aspect, and obey unfavourable socio-economic contingencies. Our research also aims at apprehending this dynamic relationship binding victimization types to tolerance thresholds through two analysing factors. These psychological mediators are derived from Lazarus and Folkman's "transactional model of stress", which postulates that stress would rise from the perception people get of the transaction between the requirements of the situation and their

  17. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  18. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  19. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  20. Teacher Victimization in Authoritative School Environments

    Science.gov (United States)

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  1. Viral attack exacerbates the susceptibility of a bloom-forming alga to ocean acidification.

    Science.gov (United States)

    Chen, Shanwen; Gao, Kunshan; Beardall, John

    2015-02-01

    Both ocean acidification and viral infection bring about changes in marine phytoplankton physiological activities and community composition. However, little information is available on how the relationship between phytoplankton and viruses may be affected by ocean acidification and what impacts this might have on photosynthesis-driven marine biological CO2 pump. Here, we show that when the harmful bloom alga Phaeocystis globosa is infected with viruses under future ocean conditions, its photosynthetic performance further decreased and cells became more susceptible to stressful light levels, showing enhanced photoinhibition and reduced carbon fixation, up-regulation of mitochondrial respiration and decreased virus burst size. Our results indicate that ocean acidification exacerbates the impacts of viral attack on P. globosa, which implies that, while ocean acidification directly influences marine primary producers, it may also affect them indirectly by altering their relationship with viruses. Therefore, viruses as a biotic stressor need to be invoked when considering the overall impacts of climate change on marine productivity and carbon sequestration. © 2014 John Wiley & Sons Ltd.

  2. The epidemiology of physical attack and rape among crack-using women.

    Science.gov (United States)

    Falck, R S; Wang, J; Carlson, R G; Siegal, H A

    2001-02-01

    This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.

  3. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    Science.gov (United States)

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  4. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully

  5. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  6. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  7. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  8. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  9. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  10. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Science.gov (United States)

    Bennett, Russell L.

    2006-01-01

    The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11) and the tragic incidents involving twenty-three people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO) nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection and analysis. Six hypotheses were tested. Using a

  11. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women.

    Science.gov (United States)

    Jeon, Yongwoog Andrew; Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-03-20

    Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled "Fat Girl Tinder Date" and "Fat Guy Tinder Date." The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Our data elucidate a worrying situation of frequent disinhibited

  12. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women

    Science.gov (United States)

    Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-01-01

    Background Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. Objective This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). Methods This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled “Fat Girl Tinder Date” and “Fat Guy Tinder Date.” The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. Results First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Conclusions Our data

  13. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  14. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  15. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  16. Victimization from workplace bullying after a traumatic event: time-lagged relationships with symptoms of posttraumatic stress.

    Science.gov (United States)

    Nielsen, Morten Birkeland; Birkeland, Marianne Skogbrott; Hansen, Marianne Bang; Knardahl, Stein; Heir, Trond

    2017-07-01

    This study examined relationships between victimization from bullying and symptoms of posttraumatic stress (PTSS) after exposure to a terror attack at the workplace. It was hypothesized that (1) victims of bullying report higher and more stable levels of PTSS over time compared to their non-bullied colleagues and (2) that PTSS provides an increased risk of subsequent victimization from bullying. The hypotheses were tested in a two-wave prospective sample comprising 2337 employees from Norwegian governmental ministries who were exposed to the 2011 Oslo terror attack. The two waves of data collection were conducted 10 and 22 months after the terror attack. Hypothesis 1 was partially supported: victims of bullying reported significantly higher levels of PTSS than non-bullied employees at both measurement points, but bullying was not related to the stability in PTSS over time. In support of hypothesis 2, PTSS at 10 months was significantly associated with an increased risk of feeling victimized by bullying 1 year later. The results indicate that victimization from bullying is associated with elevated levels of PTSS in the aftermath of a workplace terror attack, but that bullying does not have any impact on the long-term development of PTSS. PTSS may be a potential antecedent of bullying. These findings suggest that organizations must give high priority to the psychosocial work environment of traumatized employees to prevent further detrimental health consequences.

  17. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  18. Characteristic of psychological particularities of «victim» phenomenon

    Directory of Open Access Journals (Sweden)

    Skitnevskaya L.V.

    2017-04-01

    Full Text Available the article is devoted to analysis of the main psychological characteristics of the phenomenon of victims in the schools. The researchers discuss the types of victims: passive and aggressive. Passive victims have a negative attitude towards violence and prevent the use of aggressive means. The aggressive behavior of the victims is an attack on the tortfeasor. The study was conducted in the framework of the project RHSF №15–06–10575 «The study of environmental and personal factors of adolescent bullying».

  19. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  20. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  1. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    Science.gov (United States)

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  2. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  3. Bullying among schoolchildren: differences between victims and aggressors.

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; Espelt, Albert; Nebot Adell, Manel

    2013-01-01

    To identify the factors associated with bullying behaviors among adolescents by analyzing victims, aggressors and victims/aggressors separately. A cross-sectional study was performed in a representative sample of 3,089 secondary school students (13-18 years old) in Barcelona (Spain). To define bullying behaviors, we used three questions about different types of mistreatment (jeering, attacking, marginalizing). Compared with secondary school students not involved in bullying, victims, aggressors and victims/aggressors were more likely to be boys and to report negative mood states. Victims were younger, were more overweight or obese and were lighter cannabis users, while aggressors were also younger but reported more antisocial behaviors and more cannabis and alcohol use. Victims/aggressors reported more antisocial behaviors and were overweight. Being involved in bullying, independently of the role adopted, was associated with health-related problems, which can lead to psychological disorders in adulthood. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  4. A self-confirming engine for preventing man-in-the-middle attack

    OpenAIRE

    Kanamori, Masataka; Kobayashi, Takashi; Yamaguchi, Suguru

    2004-01-01

    In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping viol...

  5. Prise en charge post exposition des victimes d'agression par un ...

    African Journals Online (AJOL)

    The number of victims of aggression by an animal are growing in Burkina. Each year more than 5000 cases of attacks by animals are notified by the anti rabies treatment centers in the country. The study is to describe the post aggression management of victims of the town of Ouagadougou. It is a retrospective descriptive ...

  6. Finding Closure, Continuing Bonds, and Codentification After the 9/11 Attacks.

    Science.gov (United States)

    Toom, Victor

    2017-06-13

    In this article, I'm interested in the 2750 victims of the 9/11 attacks in New York City. I consider two connected issues. The first regards bereavement journeys of victims' families and the significance of receiving a body to bury vis-à-vis the normative assignment to find closure. The second issue I address is how forensic experts, their technologies, and managing protocols interact with victims' families and their emotions. Using insights from Science and Technology Studies, I articulate some of the goods and bads of identification practices and argue for extensive communication and cooperation between experts and victims' families.

  7. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  8. Epidemiological findings of major chemical attacks in the Syrian war are consistent with civilian targeting: a short report.

    Science.gov (United States)

    Rodriguez-Llanes, Jose M; Guha-Sapir, Debarati; Schlüter, Benjamin-Samuel; Hicks, Madelyn Hsiao-Rei

    2018-01-01

    Evidence of use of toxic gas chemical weapons in the Syrian war has been reported by governmental and non-governmental international organizations since the war started in March 2011. To date, the profiles of victims of the largest chemical attacks in Syria remain unknown. In this study, we used descriptive epidemiological analysis to describe demographic characteristics of victims of the largest chemical weapons attacks in the Syrian war. We analysed conflict-related, direct deaths from chemical weapons recorded in non-government-controlled areas by the Violation Documentation Center, occurring from March 18, 2011 to April 10, 2017, with complete information on the victim's date and place of death, cause and demographic group. 'Major' chemical weapons events were defined as events causing ten or more direct deaths. As of April 10, 2017, a total of 1206 direct deaths meeting inclusion criteria were recorded in the dataset from all chemical weapons attacks regardless of size. Five major chemical weapons attacks caused 1084 of these documented deaths. Civilians comprised the majority ( n  = 1058, 97.6%) of direct deaths from major chemical weapons attacks in Syria and combatants comprised a minority of 2.4% ( n  = 26). In the first three major chemical weapons attacks, which occurred in 2013, children comprised 13%-14% of direct deaths, ranging in numbers from 2 deaths among 14 to 117 deaths among 923. Children comprised higher proportions of direct deaths in later major chemical weapons attacks, forming 21% ( n  = 7) of 33 deaths in the 2016 major attack and 34.8% ( n  = 32) of 92 deaths in the 2017 major attack. Our finding of an extreme disparity in direct deaths from major chemical weapons attacks in Syria, with 97.6% of victims being civilians and only 2.4% being combatants provides evidence that major chemical weapons attacks were indiscriminate or targeted civilians directly; both violations of International Humanitarian Law (IHL). Identifying and

  9. Incidence and impact of dog attacks on guide dogs in the UK.

    Science.gov (United States)

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  10. Roles of dispersal, stochasticity, and nonlinear dynamics in the spatial structuring of seasonal natural enemy-victim populations

    Science.gov (United States)

    Patrick C. Tobin; Ottar N. Bjornstad

    2005-01-01

    Natural enemy-victim systems may exhibit a range of dynamic space-time patterns. We used a theoretical framework to study spatiotemporal structuring in a transient natural enemy-victim system subject to differential rates of dispersal, stochastic forcing, and nonlinear dynamics. Highly mobile natural enemies that attacked less mobile victims were locally spatially...

  11. Towards the normalization of cybercrime victimization : A routine activities analysis of cybercrime in europe

    NARCIS (Netherlands)

    Junger, Marianne; Montoya, L.; Hartel, Pieter H.; Heydari, Maliheh

    2017-01-01

    This study investigates the relationships between users' routine activities and socio-economic characteristics and three forms of cybercrime victimization of 1) online shopping fraud, 2) online banking fraud and 3) cyber-attacks (i.e. DDoS attacks). Data from the Eurobarometer, containing a sample

  12. It could have been me: vicarious victims and disaster-focused distress.

    Science.gov (United States)

    Wayment, Heidi A

    2004-04-01

    College students who had experienced no personal bereavement in the September 11 terrorist attacks completed questionnaires between 3 and 5 weeks after the attacks and 5 months later. Cross-sectional and longitudinal structural equation model (SEM) analyses revealed that general distress and disaster-focused distress are discernable reactions following a collective loss. Both types of distress were higher among women and by those reporting social strain. General distress was associated with previous stressful events and mental health issues. Perceived similarity to the victims predicted disaster-focused distress and mediated the relationship between attending to media accounts of victims and disaster-focused distress. Only the disaster-focused distress reactions of survivor guilt and grief were associated with collective helping behaviors after the attacks and, for women, these behaviors were associated with greater reductions in these distress reactions over time. Discussion focuses on the importance of examining disaster-focused distress reactions following collective loss.

  13. Physical victimization, gender identity and suicide risk among transgender men and women

    Directory of Open Access Journals (Sweden)

    Gia Elise Barboza, PhD

    2016-12-01

    Full Text Available We investigated whether being attacked physically due to one's gender identity or expression was associated with suicide risk among trans men and women living in Virginia. The sample consisted of 350 transgender men and women who participated in the Virginia Transgender Health Initiative Survey (THIS. Multivariate multinomial logistic regression was used to explore the competing outcomes associated with suicidal risk. Thirty-seven percent of trans men and women experienced at least one physical attack since the age of 13. On average, individuals experienced 3.97 (SD = 2.86 physical attacks; among these about half were attributed to one's gender identity or expression (mean = 2.08, SD = 1.96. In the multivariate multinomial regression, compared to those with no risk, being physically attacked increased the odds of both attempting and contemplating suicide regardless of gender attribution. Nevertheless, the relative impact of physical victimization on suicidal behavior was higher among those who were targeted on the basis of their gender identity or expression. Finally, no significant association was found between multiple measures of institutional discrimination and suicide risk once discriminatory and non-discriminatory physical victimization was taken into account. Trans men and women experience high levels of physical abuse and face multiple forms of discrimination. They are also at an increased risk for suicidal tendencies. Interventions that help transindividuals cope with discrimination and physical victimization simultaneously may be more effective in saving lives.

  14. Physical victimization, gender identity and suicide risk among transgender men and women.

    Science.gov (United States)

    Barboza, Gia Elise; Dominguez, Silvia; Chance, Elena

    2016-12-01

    We investigated whether being attacked physically due to one's gender identity or expression was associated with suicide risk among trans men and women living in Virginia. The sample consisted of 350 transgender men and women who participated in the Virginia Transgender Health Initiative Survey (THIS). Multivariate multinomial logistic regression was used to explore the competing outcomes associated with suicidal risk. Thirty-seven percent of trans men and women experienced at least one physical attack since the age of 13. On average, individuals experienced 3.97 (SD = 2.86) physical attacks; among these about half were attributed to one's gender identity or expression (mean = 2.08, SD = 1.96). In the multivariate multinomial regression, compared to those with no risk, being physically attacked increased the odds of both attempting and contemplating suicide regardless of gender attribution. Nevertheless, the relative impact of physical victimization on suicidal behavior was higher among those who were targeted on the basis of their gender identity or expression. Finally, no significant association was found between multiple measures of institutional discrimination and suicide risk once discriminatory and non-discriminatory physical victimization was taken into account. Trans men and women experience high levels of physical abuse and face multiple forms of discrimination. They are also at an increased risk for suicidal tendencies. Interventions that help transindividuals cope with discrimination and physical victimization simultaneously may be more effective in saving lives.

  15. The Perception of Cyberbullying in Adolescent Victims

    Science.gov (United States)

    Sevcikova, Anna; Smahel, David; Otavova, Mlada

    2012-01-01

    The goal of this study was to explore how victims of cyberbullying perceive online aggressive attacks and when they see them as harmful. Interviews were carried out with 16 cybervictimised participants aged 15-17 years. The findings showed differences in the perception of online victimisation when perpetrated by an anonymous Internet user versus…

  16. Organizational factors and office workers' health after the World Trade Center terrorist attacks: long-term physical symptoms, psychological distress, and work productivity.

    Science.gov (United States)

    Osinubi, Omowunmi Y O; Gandhi, Sampada K; Ohman-Strickland, Pamela; Boglarsky, Cheryl; Fiedler, Nancy; Kipen, Howard; Robson, Mark

    2008-02-01

    To assess if organizational factors are predictors of workers' health and productivity after the World Trade Center attacks. We conducted a survey of 750 workers and compared those who had direct exposures to the World Trade Center attacks (south of Canal Street workers; primary victims) with those less directly exposed (north of Canal Street workers; other victims and non-victims). South of Canal Street workers reported headache more frequently than north of Canal Street workers did (P = 0.0202). Primary victims reported headache and cough more frequently than did other victims and non-victims (P = 0.0086 and 0.0043, respectively). Defensive organizational culture was an independent predictor of cough and job stress, and job stress was an independent predictor of on-the-job productivity losses. Organizational variables may modify health and productivity outcomes after a large-scale traumatic event in the workplace.

  17. Maternal depression and bullying victimization among adolescents: Results from the 2004 Pelotas cohort study.

    Science.gov (United States)

    Azeredo, Catarina Machado; Santos, Iná S; Barros, Aluísio J D; Barros, Fernando C; Matijasevich, Alicia

    2017-10-01

    Maternal depression impacts on several detrimental outcomes during a child's life course, and could increase their risk of victimization. This longitudinal study examined the association between antenatal maternal depression, postnatal trajectories, and current maternal depression and offspring bullying victimization at 11 years. We included 3,441 11-year-old adolescents from the 2004 Pelotas Cohort Study. Antenatal maternal depression, postnatal trajectories, and current maternal depression data were assessed during the follow-up waves. Bullying victimization was self-reported by the adolescents. We used ordinal logistic regression to estimate the odds ratio (OR) and 95% confidence intervals (CIs), for the association between maternal depression and offspring bullying victimization. The most prevalent type of bullying was verbal victimization (37.9%). We observed a positive association between antenatal maternal depression, postnatal trajectories, and current maternal depression and physical bullying victimization. Maternal mood symptoms during pregnancy were associated with physical (OR = 1.30, 95%CI = 1.11-1.53), verbal (OR = 1.29, 95%CI = 1.12-1.49), and any victimization (OR = 1.22, 95%CI = 1.05-1.41). Severe current maternal depression was associated with physical (OR = 1.34, 95%CI = 1.10-1.62), social manipulation (OR = 1.29, 95%CI = 1.08-1.53), attacks on property (OR = 1.30, 95%CI = 1.08-1.57) and any victimization (OR = 1.32, 95%CI = 1.12-1.56). Regarding maternal depression trajectories, the "chronic-high" group was associated with higher risk of social manipulation, attacks on property and any victimization, than the "low" group. Our results strengthen the evidence of association between maternal depression and offspring bullying victimization, and physical victimization appears to be the main component. Further studies are warranted to confirm our findings and to elucidate the theoretical pathways for this longitudinal association. © 2017 Wiley

  18. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  19. Long-term effect of September 11 on the political behavior of victims' families and neighbors.

    Science.gov (United States)

    Hersh, Eitan D

    2013-12-24

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims' families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become--and have stayed--significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis.

  20. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  1. Psychometrical Assessment and Item Analysis of the General Health Questionnaire in Victims of Terrorism

    Science.gov (United States)

    Delgado-Gomez, David; Lopez-Castroman, Jorge; de Leon-Martinez, Victoria; Baca-Garcia, Enrique; Cabanas-Arrate, Maria Luisa; Sanchez-Gonzalez, Antonio; Aguado, David

    2013-01-01

    There is a need to assess the psychiatric morbidity that appears as a consequence of terrorist attacks. The General Health Questionnaire (GHQ) has been used to this end, but its psychometric properties have never been evaluated in a population affected by terrorism. A sample of 891 participants included 162 direct victims of terrorist attacks and…

  2. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  3. Protecting Anti-virus Programs From Viral Attacks

    OpenAIRE

    Mishra, Umakant

    2013-01-01

    During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use a...

  4. The media: Minimizing re-victimisation through duty of care for victims and responsible journalism

    Directory of Open Access Journals (Sweden)

    Simons Sarah

    2017-01-01

    Full Text Available This article discusses how professionally unethical practices by journalists during collection and dissemination of crime incident information in Africa, could exacerbate harm to victims of terrorist attacks. The views expressed the outcome of a desk-based study on crime reporting in Africa. Writing through the lens of ‘vulnerability’ from a non-western context, this article highlights double standards applied by some foreign and international press, who observe stipulated ethical reporting standards “at home” thereby avoiding further harm to crime victims, while disregarding these guidelines, or applying them selectively “abroad”. Reports on the Westgate Mall 21/9/2017 terrorist attack in Nairobi are used to illustrate the potential of ‘jigsaw puzzle effect’ in leading to additional victimisation by making victims identifiable, compromising their safety and psychological well-being while portraying disrespect for human dignity. The author advocates responsible journalism as a reflection of the duty of care for victims’ welfare and encourages further discussion on ethical considerations in professional crime reporting.

  5. Fatal tiger shark, Galeocerdo cuvier attack in New Caledonia erroneously ascribed to great white shark, Carcharodon carcharias.

    Science.gov (United States)

    Tirard, Philippe; Maillaud, Claude; Borsa, Philippe

    2015-07-01

    To understand the causes and patterns of shark attacks on humans, accurate identification of the shark species involved is necessary. Often, the only reliable evidence for this comes from the characteristics of the wounds exhibited by the victim. The present case report is intended as a reappraisal of the Luengoni, 2007 case (International Shark Attack File no. 4299) where a single shark bite provoked the death of a swimmer by haemorrhagic shock. Our examination of the wounds on the body of the victim, here documented by so-far unpublished photographic evidence, determined that the shark possessed large and homodontous jaws. This demonstrates that the attacker was a tiger shark, not a great white shark as previously published. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  6. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  7. Trauma and identification of victims of suicidal terrorism in Israel.

    Science.gov (United States)

    Hiss, J; Kahana, T

    2000-11-01

    The postmortem examination and identification procedures performed by medical and law enforcement personnel involved in mass disaster management in Israel are reported. The Israel National Police, the Israel Defense Forces, and the L. Greenberg Institute of Forensic Medicine's experts examined 171 victims who died in 21 incidents of suicidal terrorism. The trauma sustained by the victims and perpetrators of suicidal bombings included complete body disruption and explosive, flying missile, and blast injuries. The modus operandi of the perpetrators, reconstructed from the distribution and type of injury of the victims, is discussed. Fifty-five victims perished in open space bombings and 91 inside buses. All perpetrators of these bombings died at the time of the incident regardless of their location. Identification of the victims was achieved using fingerprints, dental records, medical intervention signs, anatomic variation, genetic profile, and personal recognition. Prompt identification of the perpetrators allowed speedy apprehension of the accomplices and prevention of similar attacks. Collaboration between the different forensic, military, and law enforcement teams increased the efficiency of disaster management efforts.

  8. User-Centred Security Education: A Game Design to Thwart Phishing Attacks

    OpenAIRE

    Arachchilage, Nalin Asanka Gamagedara

    2015-01-01

    Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This paper reports on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game des...

  9. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  10. Pathological Features of Fatal Crocodile Attacks in Northern Australia, 2005-2014.

    Science.gov (United States)

    Sinton, Terence J; Byard, Roger W

    2016-11-01

    Eleven deaths from crocodile attacks in the Northern Territory, Australia were reviewed. The male:female ratio was 8:3; age range-10-62 years, average 29.4 years. Four children were included (one boy and three girls, aged 10, 11, and two at 12 years), and there were seven aboriginal victims (64%). The attacks were witnessed in eight cases with the victims swimming in freshwater N = 5, standing on a river bank N = 1, fishing in fresh water N = 1, or diving in the sea N = 1. At autopsy, several distinct patterns of injury were observed ranging from complete traumatic disruption of the body with only incomplete remains for examination (N = 5), to crushing of the head with fractures of the skull (N = 4), crushing of the chest with fractures of the ribs and sternum (N = 2), and avulsion of limbs (N = 4). In one case, there was decapitation. Autopsy evaluations were complicated by decomposition and loss of body parts. © 2016 American Academy of Forensic Sciences.

  11. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  12. School violence in the eyes of the beholders: an integrative aggression-victimization perspective.

    Science.gov (United States)

    Laskov-Peled, Ronit; Wolf, Yuval

    2002-10-01

    Five experiments explored, within the framework of functional measurement, the importance assigned by 3rd and 4th graders (n = 117) to expectations of potential perpetrators from their potential victims. Each participant was requested to imagine potential incidents of school violence where four familiar classmates were presented as protagonists (i.e., perpetrator and victim). An orderly manipulation of the combination of the level (high or low) of aggressiveness and susceptibility to victimization in each protagonist was made. The participants were informed whether or not the victim was about to deliver tangible rewards, display signs of suffering, or retaliate (2*2*2 = 8 conditions). For each potential incident, the participant estimated the likelihood that an attack will take place. The following order of importance was found: Reward > Retaliation > Suffering. Victim's aggressiveness was slightly effective. From an applied perspective, most notable is the tendency to lower the likelihood of violence when the educator knows about the incidents.

  13. A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2010-04-01

    Full Text Available Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses' normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs' packet statistics so as to create their normal packet distribution. Once some IPs' current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

  14. Fifth-grade children's daily experiences of peer victimization and negative emotions: moderating effects of sex and peer rejection.

    Science.gov (United States)

    Morrow, Michael T; Hubbard, Julie A; Barhight, Lydia J; Thomson, Amanda K

    2014-10-01

    This study examined the relations of fifth-grade children's (181 boys and girls) daily experiences of peer victimization with their daily negative emotions. Children completed daily reports of peer victimization and negative emotions (sadness, anger, embarrassment, and nervousness) on up to eight school days. The daily peer victimization checklist was best represented by five factors: physical victimization, verbal victimization, social manipulation, property attacks, and social rebuff. All five types were associated with increased negative daily emotions, and several types were independently linked to increased daily negative emotions, particularly physical victimization. Girls demonstrated greater emotional reactivity in sadness to social manipulation than did boys, and higher levels of peer rejection were linked to greater emotional reactivity to multiple types of victimization. Sex and peer rejection also interacted, such that greater rejection was a stronger indicator of emotional reactivity to victimization in boys than in girls.

  15. The Role of the Perceptions of School Climate and Teacher Victimization by Students.

    Science.gov (United States)

    Huang, Francis L; Eddy, Colleen Lloyd; Camp, Emily

    2017-07-01

    Violence directed toward teachers in schools is relatively understudied in comparison with other school-based forms of peer aggression (e.g., school bullying). Based on the nationally representative Schools and Staffing Survey (SASS) 2011-2012, approximately 10% of K-12 public school teachers in the United States, received a threat in the past 12 months and 6% reported being physically attacked. The effects of teacher-directed violence are far reaching and affect not just the victimized teacher, but the larger community itself. In the current study, we used multilevel logistic regression models with state fixed effects to analyze the SASS data set. The analytic sample consisted of 24,070 K-12 teachers in 4,610 public schools and specifically excluded special education teachers and teachers in alternative settings (i.e., online schools, special education centers, juvenile correction facilities). Guided by authoritative school climate theory, we tested for the beneficial associations of disciplinary structure and administrative support with the reduced likelihood of a teacher being threatened or physically attacked by a student, while controlling for teacher (e.g., gender, years of experience, race/ethnicity), school (e.g., school size, percent minority enrollment), and state-level factors. Results indicated that teachers who felt supported by the administration and worked with others (i.e., the principal and other teachers) who enforced the rules consistently were less likely to be victims of threats of injury or physical attacks. Although school climate has been shown to have a positive effect on student outcomes, the current study also suggests that school climate, characterized by consistent rule enforcement and supportive administrators and teachers, may play a role in reducing the likelihood of teacher victimization.

  16. First chikungunya outbreak in Pakistan: a trail of viral attacks

    Directory of Open Access Journals (Sweden)

    T.H. Mallhi

    2017-09-01

    Full Text Available Despite explicit warning from the National Institute of Health, Pakistan experienced its first chikungunya outbreak in the metropolis of Karachi. We underscore the attention of health authorities and healthcare professionals towards contributing factors associated with this outbreak and the measures required to combat this viral disease.

  17. Viral immune evasion: a masterpiece of evolution

    NARCIS (Netherlands)

    Vossen, Mireille T. M.; Westerhout, Ellen M.; Söderberg-Nauclér, Cécilia; Wiertz, Emmanuel J. H. J.

    2002-01-01

    Coexistence of viruses and their hosts imposes an evolutionary pressure on both the virus and the host immune system. On the one hand, the host has developed an immune system able to attack viruses and virally infected cells, whereas on the other hand, viruses have developed an array of immune

  18. Intra-community coalitionary lethal attack of an adult male southern muriqui (Brachyteles arachnoides).

    Science.gov (United States)

    Talebi, M G; Beltrão-Mendes, R; Lee, P C

    2009-10-01

    We report on the first evidence of intra-community coalitionary lethal aggression in muriquis (Brachyteles). The event occurred in southern muriquis (Brachyteles arachnoides) during a long-term study (>15 years) of two social groups inhabiting mostly pristine Atlantic forest habitat in the Parque Estadual Carlos Botelho, southern São Paulo State, Brazil. The attack took place deep in the core area of the Group Caetê home range. Tense agonistic behaviors and vocalizations preceded the lethal coalitionary attack, and the tension increased over a 36-48 hr period. One adult female and two unidentified individuals also took part in a coalition led by six adult males. The members of the coalition collectively approached, embraced, immobilized and repeatedly bit the entire body of an adult male, resulting in severe bleeding injuries and the victim's death in less than 1 hr after the attack commenced. Combined ecological, behavioral and spatial data related to the event indicate that this was an intra-community attack and suggest social tensions related to mating competition as the proximate trigger of the coalitionary killing. The attack resembled those reported for chimpanzees, with clear numeric superiority and a low risk of injury to aggressors, resulting in the death of a lone conspecific victim. This observation (n=1) is suggestive of a capacity for escalated aggression in muriquis and reinforces arguments for the potential adaptive significance of intra-community aggression in male philopatric societies, as reported for spider monkeys and chimpanzees. These characteristics challenge the view of the muriquis as a peaceful primate and support the general hypothesis that imbalances of power contribute to intra-specific killing in primates, such as chimpanzees and humans.

  19. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  20. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  1. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  2. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Science.gov (United States)

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  3. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  4. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  5. Mixed-Signal Hardware Security: Attacks and Countermeasures for ΔΣ ADC

    Directory of Open Access Journals (Sweden)

    Shayan Taheri

    2017-08-01

    Full Text Available Mixed-signal integrated circuits (ICs play an eminent and critical role in design and development of the embedded systems leveraged within smart weapons and military systems. These ICs can be a golden target for adversaries to compromise in order to function maliciously. In this work, we study the security aspects of a tunnel field effect transistor (TFET-based first-order one-bit delta-sigma ( Δ Σ analog to digital converter (ADC through proposing four attack and one defense models. The first attack manipulates the input signal to the Δ Σ modulator. The second attack manipulates the analog version of the modulator output bit and is triggered by the noise signal. The third attack manipulates the modulator output bit and has a controllable trigger mechanism. The fourth attack manipulates the analog version of the modulator output bit and is triggered by a victim capacitance within the chip. For the defense, a number of signal processing filters are used in order to purge the analog version of the modulator output bit for elimination of the malicious unwanted features, introduced by the attacks. According to the simulation results, the second threat model displays the strongest attack. Derived from the countermeasure evaluation, the best filter to confront the threat models is the robust regression using the least absolute residual computing method.

  6. How to become a victim of crime

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-03-01

    threat. Among these markedly dominated the streets and other public places (64 %, as well as markets, train stations, shopping centers (18 %, places of mass recreation of citizens (10 %. This is the open area with free access unspecified persons, where the bulk of accidental contact with strangers. However, most protected from criminal attacks citizens feel in their own homes and at work. In light of the deterioration of situation of the massive spread of thefts from homes and other buildings, these opinions seem questionable. So, inability to timely and correctly identify the sources and types of criminal threats significantly increases the vulnerability of more than 60 % of citizens before the criminal assault, demonstrating their inability to avoid dangerous situations and unwillingness to protect themselves from crime. As a result, victims of crime every year becomes more and more new people who create their behavior or get into criminogenic situation. The study refutes strict correlation between compliance with the rules of personal safety and likely incur criminal assault. Thus, 42 % of respondents stated categorically safeguard measures against crime, 41 % - mainly follow these rules. Only 17 % reported disregard of safety rules. This trend indicates a lack of clear understanding of the citizens of the sources and types of criminal threats. On them is only a general idea. In the population there is a perception that victimization behavior should be sure to wear obvious and provocative character, being understood by the general public. So when people so-called "moderate risk" - is considered the norm, few people are alarming. During the survey of victimological studied of citizens the issue of criteria for which offenders choose victims of crime. Among these victims are called: coincidence – 27 %; inattention in public places – 25 %; living in criminogenic areas - 11.3 %; obvious signs of provocative behavior (excessive trust in strangers, stay drunk

  7. Fatal tiger shark, Galeocerdo cuvier attack in New Caledonia erroneously ascribed to great white shark, Carcharodon carcharias

    OpenAIRE

    Tirard, P.; Maillaud, C.; Borsa, Philippe

    2015-01-01

    International audience; To understand the causes and patterns of shark attacks on humans, accurate identification of the shark species involved is necessary. Often, the only reliable evidence for this comes from the characteristics of the wounds exhibited by the victim. The present case report is intended as a reappraisal of the Luengoni, 2007 case (International Shark Attack File no. 4299) where a single shark bite provoked the death of a swimmer by haemorrhagic shock. Our examination of the...

  8. Virus-induced asthma attack: The importance of allergic inflammation in response to viral antigen in an animal model of asthma.

    Science.gov (United States)

    Skappak, Christopher; Ilarraza, Ramses; Wu, Ying-Qi; Drake, Matthew G; Adamko, Darryl J

    2017-01-01

    Asthma exacerbation can be a life-threatening condition, and is most often triggered by common respiratory viruses. Poor asthma control and worsening of respiratory function is associated with increased airway inflammation, including eosinophilia. Prevention of asthma exacerbation relies on treatment with corticosteroids, which preferentially inhibit allergic inflammation like eosinophils. Human studies demonstrate that inactivated virus can trigger eosinophil activation in vitro through antigen presentation and memory CD4+ lymphocytes. We hypothesized that animals with immunologic memory to a respiratory virus would also develop airway hyperresponsiveness in response to a UV-inactivated form of the virus if they have pre-existing allergic airway inflammation. Guinea pigs were ovalbumin-sensitized, infected with live parainfluenza virus (PIV), aerosol-challenged with ovalbumin, and then re-inoculated 60 days later with live or UV-inactivated PIV. Some animals were either treated with dexamethasone prior to the second viral exposure. Lymphocytes were isolated from parabronchial lymph nodes to confirm immunologic memory to the virus. Airway reactivity was measured and inflammation was assessed using bronchoalveolar lavage and lung histology. The induction of viral immunologic memory was confirmed in infected animals. Allergen sensitized and challenged animals developed airway hyperreactivity with eosinophilic airway inflammation when re-exposed to UV-inactivated PIV, while non-sensitized animals did not. Airway hyperreactivity in the sensitized animals was inhibited by pre-treatment with dexamethasone. We suggest that the response of allergic inflammation to virus antigen is a significant factor causing asthma exacerbation. We propose that this is one mechanism explaining how corticosteroids prevent virus-induced asthma attack.

  9. CT images of infantile viral encephalitis

    International Nuclear Information System (INIS)

    Sugimoto, Tateo; Okazaki, Hitoshi; Woo, Man

    1985-01-01

    Cranial CT scanning was undertaken in 40 patients with infantile viral encephalitis seen from 1977 to 1983. According to the pathogenic viruses, abnormal CT findings were detected most frequently in cases of herpes simplex encephalitis (HSE), followed by non-eruptive viral encephalitis, measles encephalitis, and rubella encephalitis in that order, which coincided well with neurological prognosis. Although CT findings lay within a normal range in cases of measles encephalitis, except a case in which cerebral ventricle was slightly dilated, the degree of consciousness disturbance was unfavorable and it persisted long. This revealed that there is no distinct correlation between the degree of consciousness disturbance and CT findings. Normal CT findings were detected in 13% of patients aged less than 5 years and 76.5% of patients aged 5 years or more. In many patients who had an attack of viral encephalitis at the age of 5 years or more, epileptic seizures occurred frequently, even though CT findings were normal. (Namekawa, K.)

  10. Characteristics of atopic children with pandemic H1N1 influenza viral infection: pandemic H1N1 influenza reveals 'occult' asthma of childhood.

    Science.gov (United States)

    Hasegawa, Shunji; Hirano, Reiji; Hashimoto, Kunio; Haneda, Yasuhiro; Shirabe, Komei; Ichiyama, Takashi

    2011-02-01

    The number of human cases of pandemic H1N1 influenza viral infection has increased in Japan since April 2009, as it has worldwide. This virus is widespread in the Yamaguchi prefecture in western Japan, where most infected children exhibited respiratory symptoms. Bronchial asthma is thought to be one of the risk factors that exacerbate respiratory symptoms of pandemic H1N1-infected patients, but the pathogenesis remains unclear. We retrospectively investigated the records of 33 children with pandemic H1N1 influenza viral infection who were admitted to our hospital between October and December 2009 and analyzed their clinical features. The percentage of children with asthma attack, with or without abnormal findings on chest radiographs (pneumonia, atelectasis, etc.), caused by pandemic H1N1 influenza infection was significantly higher than that of children with asthma attack and 2008-2009 seasonal influenza infection. Of the 33 children in our study, 22 (66.7%) experienced an asthma attack. Among these children, 20 (90.9%) did not receive long-term management for bronchial asthma, whereas 7 (31.8%) were not diagnosed with bronchial asthma and had experienced their first asthma attack. However, the severity of the attack did not correlate with the severity of the pulmonary complications of pandemic H1N1 influenza viral infection. The pandemic H1N1 influenza virus greatly increases the risk of lower respiratory tract complications such as asthma attack, pneumonia, and atelectasis, when compared to the seasonal influenza virus. Furthermore, our results suggest that pandemic H1N1 influenza viral infection can easily induce a severe asthma attack, pneumonia, and atelectasis in atopic children without any history of either an asthma attack or asthma treatment. © 2011 John Wiley & Sons A/S.

  11. European project BOOSTER: how to sort victims of a nuclear accident?

    International Nuclear Information System (INIS)

    Robbe, M.F.; Gmar, M.; Schoepff, V.

    2013-01-01

    The purpose of the BOOSTER project is to develop tools allowing victims to be sorted quickly according to their level of irradiation. The fastness of the sorting is very important as a nuclear accident or a terrorist attack involving a dirty bomb is likely to cause numerous casualties. A preliminary sorting can be made with a portable walk-through gamma detector that allows the detection of contaminated victims. 4 technologies are proposed for assessing in less than 20 minutes the level of irradiation of a victim: the first method that is based on the analysis of the phosphorylation of the H2AX protein, allows the determination of the irradiation level from the analysis of a drop of blood. The second method allows the determination of the radionuclides present in a drop of blood or urine. The third method uses the thermo-luminescent properties of SMD resistances present in mobile phones to determine the level of irradiation. The fourth method is based on a portable low-background gamma spectrometer able to study environmental and biological samples on the spot. (A.C.)

  12. Mean ages of homicide victims and victims of homicide-suicide.

    Science.gov (United States)

    Bridges, F Stephen; Tankersley, William B

    2010-02-01

    Using Riedel and Zahn's 1994 reformatted version of an FBI database, the mean age of homicide victims in 2,175 homicide-suicides (4,350 deaths) was compared with that of all other victims of homicides reported for the USA from 1968 to 1975. The overall mean age of homicide victims in homicide-suicides was 1 yr. greater than for victims of homicides not followed by suicides, whereas the mean age for both male and female homicide-suicide victims was, respectively, 3 yr. less and greater than the other homicide victims. The mean age of Black homicide victims of homicide-suicides was 2.4 yr. less than that for Black victims of other homicides, whereas the means for Black and White male homicide victims in homicide-suicides were, respectively, about 4 and 5 yr. less than for victims of other homicides. Also, the mean age of White female homicide victims in homicide-suicides was more than two years greater than for female victims of homicides not followed by suicides. When both sex and race were considered, the mean age for those killed in homicide-suicides relative to those killed in homicides not followed by suicides may represent subpopulations with different mean ages of victims.

  13. Being a victim or an aggressor: Different functions of triadic post-conflict interactions in wolves (Canis lupus lupus).

    Science.gov (United States)

    Cordoni, Giada; Palagi, Elisabetta

    2015-01-01

    Animals adopt different behavioral strategies to cope with the conflict of interests coming from the competition over limited resources. Starting from the study on chimpanzees, post-conflict third-party affiliation (the affiliative contact provided by a third-party toward the victim--VTA--or the aggressor--ATA) was investigated mainly in primates. Later, this post-conflict mechanism has been demonstrated also in other mammals, such as wallabies, horses, dolphins, domestic dogs, and wolves. Here, we present data on triadic post-conflict affiliation in wolves (Canis lupus lupus) by exploring some of the hypotheses already proposed for primates and never tested before in other social mammals. In this carnivore species, the study of VTA and ATA revealed that these strategies cannot be considered as a unique behavioral category since they differ in many functional aspects. VTA serves to protect the victim by reducing the likelihood of reiterated attacks from the previous aggressor and to reinforce the relationship shared by the third-party and the victim. On the other hand, ATA has a role in bystander protection by limiting the renewed attacks of the previous aggressor toward uninvolved group-members (potential third-parties). In conclusion, exploring VTA and ATA gives the opportunity to concurrently demonstrate some functional differences in triadic post-conflict affiliation according to the different targets of bystanders (victims or aggressors). The data comparison between primates and other social mammals should permit to open new lines of research. © 2015 Wiley Periodicals, Inc.

  14. Expressions of Gender-based Violence in the Impact of Anti-personnel Mine Attacks in Colombia

    Directory of Open Access Journals (Sweden)

    Gabriel A. Ruiz Romero

    2017-02-01

    Full Text Available This text, based on fieldwork carried out between 2014 and 2015, firstly analyses the way that Gender-Based Violence (GBV in armed conflict is also expressed through forms of victimization like anti-personnel mine (APM attacks. It also studies how women who belong to associations of APM victims confront the consequences of this victimization, much of which has clear gender connotations, placing them at the highest level of vulnerability and stigmatization. The article shows that, although mines originated as an indiscriminate form of violence (given the nature of the instrument used, the violence exercised by their use contains two main components of GBV by which women are profoundly affected, in view of the patriarchal context in which such violence takes place: firstly by using the body as a space of dispute and secondly in the continuum that affects women’s lives. These two components enhance the physical and psychological consequences for the direct victims of these devices and the emotional impact for their indirect victims (victims’ relatives, and are a factor in the considerable disruption of women’s traditional roles within families, thus weakening the community’s social fabric.

  15. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  16. Predicting Rape Victim Empathy Based on Rape Victimization and Acknowledgment Labeling.

    Science.gov (United States)

    Osman, Suzanne L

    2016-06-01

    Two studies examined rape victim empathy based on personal rape victimization and acknowledgment labeling. Female undergraduates (Study 1, n = 267; Study 2, n = 381) from a Northeast U.S. midsize public university completed the Rape-Victim Empathy Scale and Sexual Experiences Survey. As predicted, both studies found that acknowledged "rape" victims reported greater empathy than unacknowledged victims and nonvictims. Unexpectedly, these latter two groups did not differ. Study 1 also found that acknowledged "rape" victims reported greater empathy than victims who acknowledged being "sexually victimized." Findings suggest that being raped and acknowledging "rape" together may facilitate rape victim empathy. © The Author(s) 2015.

  17. Attack in a subway by an explosive containing radioactive substance. Specificities of the taking charge and assistance organization

    International Nuclear Information System (INIS)

    Curet, P.M.

    1999-01-01

    The use of explosives with radioactive material in them during an attack in the subway obliges several specificities in the help organisation, in the taking charge of victims and in the environmental management for the broadest meaning. That is the purpose of this article. (N.C.)

  18. Epidemiological Investigation of an Outbreak of Viral Hepatitis.

    Science.gov (United States)

    Singh, Pmp; Handa, S K; Banerjee, A

    2006-10-01

    There was a rise in the number of viral hepatitis cases in a regimental training centre in Mar 2003 and an epidemic of viral hepatitis was suspected. The clinical case sheets and preliminary investigations carried out in the local military hospital (MH) were reviewed. A cross sectional descriptive epidemiological study was undertaken with survey odf the suspected sewage and water pipelines. A total of 36 cases occurred from Mar 2003 to Apr 2003. There was clustering in time and space suggesting common source epidemic. All the 36 serum samples tested for IgM anti HEV antibodies were positive. Exploration of the water pipelines revealed sewage contamination due to leakage in the pipeline passing close to the sewage line. The overall attack rate was 1.44%. The outbreak of viral hepatitis in the regimental training centre occurred due to sewage contamination of drinking water pipeline.

  19. Immigrants as crime victims: Experiences of personal nonfatal victimization.

    Science.gov (United States)

    Wheeler, Krista; Zhao, Weiyan; Kelleher, Kelly; Stallones, Lorann; Xiang, Huiyun

    2010-04-01

    Immigrants to the United States are disproportionately victims of homicide mortality in and outside the workplace. Examining their experiences with nonfatal victimization may be helpful in understanding immigrant vulnerability to violence. We compared the annual prevalence of nonfatal personal victimization experienced by immigrant and US-born adults by sociodemographics, employment, occupation, industry, smoking, alcohol and drug use using data from Wave 1 National Epidemiologic Survey on Alcohol and Related Conditions. The prevalence of victimization among immigrants was comparable to that among US-born adults [3.84% (95% CI: 3.18-4.63) vs. 4.10% (95% CI: 3.77-4.44)]. Lower percentages of victimization experienced by immigrants were seen among the unmarried, those age 30-44 years, and among residents of central city areas as compared to those groups among the US-born. For immigrants entering the US as youth, the victimization prevalence declines with greater years of residency in US. Multivariate logistic regression models suggest that, the odds of victimization was significantly associated with age, family income, marital status, central city residency, smoking, and drug use while employment status was not a significant factor. Immigrant workers with farming/forestry occupations might face a higher risk of being victims of violence than their US-born counterparts. The prevalence of victimization among immigrants was comparable to that among US-born adults. Employment status and industry/occupation overall were not significant risk factors for becoming victims of violence. (c) 2010 Wiley-Liss, Inc.

  20. A fatal attack caused by a lowland tapir (Tapirus terrestris) in southeastern Brazil.

    Science.gov (United States)

    Haddad, Vidal; Assunção, Melissa Chagas; de Mello, Ricardo Coelho; Duarte, Marcelo Ribeiro

    2005-01-01

    A 55-year-old man was attacked by a Brazilian tapir (Tapirus terrestris) after surprising and stabbing the animal in his corn plantation. The victim received deep bites in the thighs, neck, and cervical areas, resulting in severe hemorrhage and death. This is the first report of a tapir incident resulting in death and is of interest because of the severity of the contusions and lacerations caused by the provoked animal.

  1. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  2. Attacking Postoperative Metastases using Perioperative Oncolytic Viruses and Viral Vaccines

    Science.gov (United States)

    Tai, Lee-Hwa; Auer, Rebecca

    2014-01-01

    Surgical resection of solid primary malignancies is a mainstay of therapy for cancer patients. Despite being the most effective treatment for these tumors, cancer surgery has been associated with impaired metastatic clearance due to immunosuppression. In preclinical surgery models and human cancer patients, we and others have demonstrated a profound suppression of both natural killer (NK) and T cell function in the postoperative period and this plays a major role in the enhanced development of metastases following surgery. Oncolytic viruses (OV) were originally designed to selectively infect and replicate in tumors, with the primary objective of directly lysing cancer cells. It is becoming increasingly clear, however, that OV infection results in a profound inflammatory reaction within the tumor, initiating innate and adaptive immune responses against it that is critical for its therapeutic benefit. This anti-tumor immunity appears to be mediated predominantly by NK and cytotoxic T cells. In preclinical models, we found that preoperative OV prevents postoperative NK cell dysfunction and attenuates tumor dissemination. Due to theoretical safety concerns of administering live virus prior to surgery in cancer patients, we characterized safe, attenuated versions of OV, and viral vaccines that could stimulate NK cells and reduce metastases when administered in the perioperative period. In cancer patients, we observed that in vivo infusion with oncolytic vaccinia virus and ex vivo stimulation with viral vaccines promote NK cell activation. These preclinical studies provide a novel and clinically relevant setting for OV therapy. Our challenge is to identify safe and promising OV therapies that will activate NK and T cells in the perioperative period preventing the establishment of micrometastatic disease in cancer patients. PMID:25161958

  3. Spatio-temporal patterns of attacks on human and economic losses from wildlife in Chitwan National Park, Nepal.

    Science.gov (United States)

    Lamichhane, Babu Ram; Persoon, Gerard A; Leirs, Herwig; Poudel, Shashank; Subedi, Naresh; Pokheral, Chiranjibi Prasad; Bhattarai, Santosh; Thapaliya, Bishnu Prasad; de Iongh, Hans H

    2018-01-01

    Wildlife attacks on humans and economic losses often result in reduced support of local communities for wildlife conservation. Information on spatial and temporal patterns of such losses in the highly affected areas contribute in designing and implementing effective mitigation measures. We analyzed the loss of humans, livestock and property caused by wildlife during 1998 to 2016, using victim family's reports to Chitwan National Park authorities and Buffer Zone User Committees. A total of 4,014 incidents were recorded including attacks on humans, livestock depredation, property damage and crop raiding caused by 12 wildlife species. In total >400,000 US dollar was paid to the victim families as a relief over the whole period. Most of the attacks on humans were caused by rhino, sloth bear, tiger, elephant, wild boar and leopard. A significantly higher number of conflict incidents caused by rhino and elephant were observed during full moon periods. An increase in the wildlife population did not coincide with an equal rise in conflict incidents reported. Underprivileged ethnic communities were attacked by wildlife more frequently than expected. Number of attacks on humans by carnivores and herbivores did not differ significantly. An insignificant decreasing trend of wildlife attacks on humans and livestock was observed with significant variation over the years. Tiger and leopard caused >90% of livestock depredation. Tigers killed both large (cattle and buffalo) and medium sized (goat, sheep, pig) livestock but leopard mostly killed medium sized livestock. Most (87%) of the livestock killing during 2012-2016 occurred within the stall but close (conflict mitigation measures (electric and mesh wire fences) have contributed to keep the conflict incidents in control. Strengthening mitigation measures like construction of electric or mesh wire fences and predator-proof livestock corrals along with educating local communities about wildlife behavior and timely management of

  4. Use of DNA from bite marks can determine species and individual animals that attack humans

    Science.gov (United States)

    Farley, Sean; Talbot, Sandra L.; Sage, George K.; Sinnott, Rick; Coltrane, Jessica

    2014-01-01

    During the summer of 2008, 6 documented attacks and close encounters with brown bears (Ursus arctos) occurred in the greater Anchorage, Alaska (USA) area. We discuss findings from 2 incidents in which people were mauled within 2 km of each other over a 6-week period and in which it was assumed that a single animal was responsible. To ensure public safety, authorities killed a brown bear implicated in the attacks by circumstantial evidence, though it was not known a priori that the animal was responsible. We extracted DNA from hairs and bite sites on the clothing of both victims and determined species and individual identity of the animal(s) involved in both incidents. Genetic data indicated the brown bear killed by authorities was responsible for one of the maulings, but not both. This research demonstrates that DNA-based techniques, with appropriate sampling, can provide unambiguous identification of animals involved in attacks, as well as provide reasonable justification for excluding others. Because DNA-based techniques can unequivocally identify individual bears carrying out attacks, they should be considered a standard method employed in wildlife attack investigations.

  5. Understanding Gender Differences in Rape Victim Blaming: The Power of Social Influence and Just World Beliefs.

    Science.gov (United States)

    Pinciotti, Caitlin M; Orcutt, Holly K

    2017-08-01

    Victims of sexual violence are frequently blamed by friends, family, or legal personnel in the aftermath of an attack, with men attributing greater blame on average than women. Victims' experiences of being blamed may generate a vicious cycle in which they are more likely to be blamed in the future. Moreover, just world beliefs (JWB) have been studied extensively as an underlying cognitive mechanism that predicts greater blame. Studies examining the influence of social support on blame have yet to examine the unique role of JWB on these attributions. The current study examined blame attribution of a fictional rape victim who received either positive, negative, or neutral support from friends and family in a sample of 383 undergraduate men and women. Individually, social support and JWB were both significant predictors of blame, and women were more influenced by social support than men; specifically, gender was a more salient predictor of blame toward the positively supported victim, suggesting that positive support received by friends and family may evoke a domino effect of support from other women. Conditional effects revealed that JWB were most influential on blame when responding to the positively supported victim. Implications and suggestions for future research are discussed.

  6. Moral reasoning and emotion attributions of adolescent bullies, victims, and bully-victims.

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-11-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents aged 12-18 (57% females) reported the frequency of involvement in bullying and victimization. Participants were categorized as bullies (14.3%), bully-victims (3.9%), and victims (9.7%). Moral judgment, moral justifications, and emotion attributions to a hypothetical perpetrator of a moral transgression (relational aggression) were assessed. Bullies showed more morally disengaged reasoning than non-involved students. Bully-victims more frequently indicated that violating moral rules is right. Victims produced more victim-oriented justifications (i.e., more empathy) but fewer moral rules. Among victims, the frequency of morally responsible justifications decreased and the frequency of deviant rules increased with age. The findings are discussed from an integrative moral developmental perspective. ©2011 The British Psychological Society.

  7. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  8. Fatal attack on black-tufted-ear marmosets (Callithrix penicillata) by a Boa constrictor: a simultaneous assault on two juvenile monkeys.

    Science.gov (United States)

    Teixeira, Danilo Simonini; dos Santos, Edmilson; Leal, Silvana Gomes; de Jesus, Andrea Karla; Vargas, Waldemir Paixão; Dutra, Irapuan; Barros, Marilia

    2016-01-01

    Here we report the first witnessed attack on a marmoset by a constrictor snake. The incident occurred mid-morning in a gallery forest within an altered landscape of the Cerrado region of central Brazil and refers to a fatal attack by a Boa constrictor on two juvenile black-tufted-ear marmosets (Callithrix penicillata) simultaneously. The snake captured both individuals at a height of ~ 4 m while a group of eight marmosets traveled through the subcanopy. The actual strike was not seen. After 2 min, the boa fell to the ground with both marmosets in its coils and proceeded to kill one animal at a time through constriction. Two adult marmosets immediately descended to where the snake held its victims on the ground and attacked it. The snake showed no apparent reaction, and after ~ 1-2 min, the adults rejoined the remaining group members that were mobbing and vocalizing from 5 to 6 m above. The group left the scene ~ 7 min after the onset of the attack and was not seen again. The snake loosened its coils 10 min after its initial strike, left the two carcasses on the ground and stayed behind a nearby tree. Thus, we are not sure if the victims were in fact ingested. This report confirms that marmosets are vulnerable to boid snakes and capable of highly organized and cooperative antipredation behavior. It also suggests that snakes pose a greater threat to callitrichids than previously thought.

  9. Medical mitigation model: quantifying the benefits of the public health response to a chemical terrorism attack.

    Science.gov (United States)

    Good, Kevin; Winkel, David; VonNiederhausern, Michael; Hawkins, Brian; Cox, Jessica; Gooding, Rachel; Whitmire, Mark

    2013-06-01

    The Chemical Terrorism Risk Assessment (CTRA) and Chemical Infrastructure Risk Assessment (CIRA) are programs that estimate the risk of chemical terrorism attacks to help inform and improve the US defense posture against such events. One aspect of these programs is the development and advancement of a Medical Mitigation Model-a mathematical model that simulates the medical response to a chemical terrorism attack and estimates the resulting number of saved or benefited victims. At the foundation of the CTRA/CIRA Medical Mitigation Model is the concept of stock-and-flow modeling; "stocks" are states that individuals progress through during the event, while "flows" permit and govern movement from one stock to another. Using this approach, the model is able to simulate and track individual victims as they progress from exposure to an end state. Some of the considerations in the model include chemical used, type of attack, route and severity of exposure, response-related delays, detailed treatment regimens with efficacy defined as a function of time, medical system capacity, the influx of worried well individuals, and medical countermeasure availability. As will be demonstrated, the output of the CTRA/CIRA Medical Mitigation Model makes it possible to assess the effectiveness of the existing public health response system and develop and examine potential improvement strategies. Such a modeling and analysis capability can be used to inform first-responder actions/training, guide policy decisions, justify resource allocation, and direct knowledge-gap studies.

  10. Victimization experiences and adolescent substance use: does the type and degree of victimization matter?

    Science.gov (United States)

    Pinchevsky, Gillian M; Fagan, Abigail A; Wright, Emily M

    2014-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only assess these relationships in the short-term using cross-sectional data. This study uses data from the Project on Human Development in Chicago Neighborhoods (PHDCN) to explore the impact of experiencing only indirect victimization, only direct victimization, both forms of victimization, and no victimization on substance use at two time points during adolescence. We find that of those adolescents who are victimized, the majority experience indirect victimization only, followed by experiencing both forms of victimization, and experiencing direct victimization only. Each of the victimization experiences were associated with increased contemporaneous substance use, with the strongest effects for those experiencing multiple forms of violence. For all victims, however, the impact on substance use declined over time.

  11. Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks

    OpenAIRE

    Arachchilage, Nalin Asanka Gamagedara; Cole, Melissa

    2016-01-01

    This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real ...

  12. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  13. Victimization Experiences and the Stabilization of Victim Sensitivity

    Directory of Open Access Journals (Sweden)

    Mario eGollwitzer

    2015-04-01

    Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.

  14. Effects of the 2002 sniper attacks on the homeless population in Washington, DC.

    Science.gov (United States)

    Fullerton, Carol S; Gifford, Robert K; Flynn, Brian W; Peterson, Karen M; Ahearn, Frederick L; Donaldson, Linda Plitt; Ursano, Robert J

    2009-10-01

    Despite the prevalence of homelessness, this population has rarely been included in disaster and terrorism planning. To better understand the mental health needs of the homeless during a terrorist event and to highlight the need to address methodological limitations in research in this area, we examined responses to the October 2002 Washington, DC, sniper attacks. We interviewed 151 homeless individuals 1 year after the Washington, DC, sniper attacks. The majority (92.7%) was aware of the sniper events; 84.1% stayed informed through the media and 72.7% had someone to turn to for emotional support. Almost half (44%) reported identification with victims and 41% increased substance use during the attacks. More than half (61.7%) felt extremely frightened or terrified and 57.6% reported high perceived threat. Females, nonwhites, and participants with less than a high school education experienced greater threat. Women, nonwhites, and younger (homeless population may be difficult to reach or reluctant to comply with public health programs. Addressing barriers to health care in vulnerable groups is critical to effective public health disaster response.

  15. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  16. 34 CFR 674.64 - Discharge of student loan indebtedness for survivors of victims of the September 11, 2001, attacks.

    Science.gov (United States)

    2010-07-01

    ..., other safety or rescue personnel, or as a member of the Armed Forces; and (ii)(A) Died due to injuries... to injuries suffered in the terrorist attacks on September 11, 2001. (2) Died due to injuries suffered in the terrorist attacks on September 11, 2001 means the individual was present at the World Trade...

  17. Covariation of viral parameters with bacterial assemblage richness and diversity in the water column and sediments

    Science.gov (United States)

    Hewson, Ian; Fuhrman, Jed A.

    2007-05-01

    include many opportunistic taxa (e.g. Vibrionaceae), and because these bacteria may be more susceptible to viral attack due to enhanced resource uptake abilities and potentially rapid localized growth, it is possible that this negative effect was due to enhanced viral lysis. Consequently, virus infection may have positive effects upon bacterioplankton diversity in the oligotrophic ocean, by regulating the abundance of dominant competitors, and allowing rarer taxa to coexist; however, some rarer taxa (such as diazotrophs) may be more susceptible to viral attack due to opportunistic lifestyles.

  18. Bullies, Victims, and Bully/Victims: Distinct Groups of At-Risk Youth.

    Science.gov (United States)

    Haynie, Denise L.; Nasel, Tonja; Eitel, Patricia; Crump, Aria Davis; Saylor, Keith; Yu, Kai; Simons-Morton, Bruce

    2001-01-01

    Surveyed middle school students on incidents of bullying and victimization. Found that psychosocial and behavioral predictors such as problem behaviors, attitudes toward deviance, peer influences, depressive symptoms, school-related functioning, and parenting linearly separated never bullied or victimized students from the victim group, from the…

  19. Trauma-Focused Early Intensive Cognitive Behavioral Intervention (TF-EICBI) in children and adolescent survivors of suicide bombing attacks (SBAs). A preliminary study.

    Science.gov (United States)

    Leor, Agnes; Dolberg, Orna T; Eshel, Shira Pagorek; Yagil, Yaron; Schreiber, Shaul

    2013-01-01

    To describe and evaluate the impact of an early intervention (Trauma-Focused Early Intensive Cognitive Behavioral Intervention, TF-EICBI) in children and adolescents who were victims of suicide bombing attacks (SBAs) in Israel. Description of an intervention and preliminary experience in its use. An acute trauma center of a Child and Adolescent Psychiatric Unit in a Department of Psychiatry of a university-affiliated medical center. Ten children and adolescents who were victims of SBAs and underwent early interventions (EIG) were compared to 11 adolescent victims who received no intervention (NEIG). The EIG included all the children and adolescent survivors of various SBAs that had occurred during 1 year who presented to our hospital after the TF-EICBI was implemented (June 2001). The NEIG comprised all adolescents girls children and adolescents after SBAs.

  20. Psychosocial profile of bullies, victims, and bully-victims: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Marie eLeiner

    2014-01-01

    Full Text Available While adverse conditions in a child’s life do not excuse inappropriate behavior, they may cause emotional and behavioral problems that require treatment as a preventive measure to reduce the likelihood of bullying. We aimed to identify differences in the psychosocial profiles of adolescents who classified themselves as bullies, victims, or bully-victims. We performed a cross-sectional study in which data were collected between January 2009 and January 2010 from seven university-based clinics in a large metropolitan area with a predominantly Mexican-American population. We collected data on physical aggression among adolescents who self-categorized into the following groups: uninvolved, bullies, victims, and bully-victims. We determined the psychosocial profiles of the adolescents based on responses to the Youth Self Report (YSR and parent’s responses to the Child Behavior Checklist (CBCL. A one-way analysis of variance and multivariate regression analyses were performed to compare the various components of the psychosocial profiles among the groups. Our analysis of the CBCL and the YSR assessments identified differences between the uninvolved group and one or more of the other groups. No significant differences were observed among the bully, victim, and bully-victim groups based on the CBCL. We did find significant differences among those groups based on the YSR, however. Our results suggest that emotional and behavioral problems exist among bullies, victims, and bully-victims. Therefore, treatment should not focus only on the victims of bullying; treatment is equally important for the other groups (bullies and bully-victims. Failure to adequately treat the underlying problems experienced by all three groups of individuals could allow the problems of bullying to continue.

  1. Child victims and poly-victims in China: are they more at-risk of family violence?

    Science.gov (United States)

    Chan, Ko Ling

    2014-11-01

    Multiple forms of violence may co-occur on a child. These may include various forms of child victimization and different types of family violence. However, evidence that child victims are more likely to witness other types of family violence has been lacking in China. Using data of a large and diverse sample of children recruited from 6 regions in China during 2009 and 2010 (N=18,341; 47% girls; mean age=15.9 years), the associations between child victimization and family violence witnessed were examined. Descriptive statistics and the associations between child victimization, demographic characteristics, and family violence witnessed were analyzed. Lifetime and preceding-year rates were 71.7% and 60.0% for any form of child victimization and 14.0% and 9.2% for poly-victimization (having four or more types of victimization), respectively. Family disadvantages (i.e., lower socio-economic status, single parents, and having more than one child in the family) were associated with child victimization and poly-victimization. Witnessing of parental intimate partner violence, elder abuse, and in-law conflict also increased the likelihood of child victimization and poly-victimization, even after the adjustment of demographic factors. Possible mechanisms for the links between family violence and child victimization are discussed. The current findings indicated the need for focusing on the whole family rather than the victim only. For example, screening for different types of family violence when child victims are identified may help early detection of other victims within the family. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  3. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  4. Following the terrorist attacks recently committed in the United States of America, and according to the recommendations of the Council of the European Union, the CERN staff observed 3 minutes of silence on Friday 14 September 2001 at 12h00, as a sign of deepest sympathy for all the victims and their families, and of solidarity with the American people

    CERN Multimedia

    Maximilien Brice

    2001-01-01

    Following the terrorist attacks recently committed in the United States of America, and according to the recommendations of the Council of the European Union, the CERN staff observed 3 minutes of silence on Friday 14 September 2001 at 12h00, as a sign of deepest sympathy for all the victims and their families, and of solidarity with the American people

  5. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  6. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  7. Victimization Experiences and Adolescent Substance Use: Does the Type and Degree of Victimization Matter?

    OpenAIRE

    Pinchevsky, Gillian M.; Fagan, Abigail A.; Wright, Emily M.

    2013-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only asses...

  8. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  9. Reporting Crime Victimizations to the Police and the Incidence of Future Victimizations: A Longitudinal Study.

    Science.gov (United States)

    Ranapurwala, Shabbar I; Berg, Mark T; Casteel, Carri

    2016-01-01

    Law enforcement depends on cooperation from the public and crime victims to protect citizens and maintain public safety; however, many crimes are not reported to police because of fear of repercussions or because the crime is considered trivial. It is unclear how police reporting affects the incidence of future victimization. To evaluate the association between reporting victimization to police and incident future victimization. We conducted a retrospective cohort study using National Crime Victimization Survey 2008-2012 data. Participants were 12+ years old household members who may or may not be victimized, were followed biannually for 3 years, and who completed at least one follow-up survey after their first reported victimization between 2008 and 2012. Crude and adjusted generalized linear mixed regression for survey data with Poisson link were used to compare rates of future victimization. Out of 18,657 eligible participants, 41% participants reported to their initial victimization to police and had a future victimization rate of 42.8/100 person-years (PY) (95% CI: 40.7, 44.8). The future victimization rate of those who did not report to the police (59%) was 55.0/100 PY (95% CI: 53.0, 57.0). The adjusted rate ratio comparing police reporting to not reporting was 0.78 (95%CI: 0.72, 0.84) for all future victimizations, 0.80 (95% CI: 0.72, 0.90) for interpersonal violence, 0.73 (95% CI: 0.68, 0.78) for thefts, and 0.95 (95% CI: 0.84, 1.07) for burglaries. Reporting victimization to police is associated with fewer future victimization, underscoring the importance of police reporting in crime prevention. This association may be attributed to police action and victim services provisions resulting from reporting.

  10. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  11. The Consent of the Victim as Legal Defence in Cybercrime cases

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2017-05-01

    Full Text Available The rise of Cybercrimes provides with great concerns among users, industry, banking sector or public institutions in terms of how much secure their computer systems or computer data are. Both Ethical and Non-Ethical hacking came-up as viable solutions for any natural or legal person willing to perform its own security checks. Taking into consideration the nature of such security evaluation techniques, that in certain situations may be regarded as cybercrimes, there should be a proper understanding of the circumstances when the victim may grant permission to the attackers to perform specific tasks against its own systems or data, especially when these belongs to a public institution.

  12. Moral Reasoning and Emotion Attributions of Adolescent Bullies, Victims, and Bully-Victims

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-01-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…

  13. Influenza Virus Mounts a Two-Pronged Attack on Host RNA Polymerase II Transcription.

    Science.gov (United States)

    Bauer, David L V; Tellier, Michael; Martínez-Alonso, Mónica; Nojima, Takayuki; Proudfoot, Nick J; Murphy, Shona; Fodor, Ervin

    2018-05-15

    Influenza virus intimately associates with host RNA polymerase II (Pol II) and mRNA processing machinery. Here, we use mammalian native elongating transcript sequencing (mNET-seq) to examine Pol II behavior during viral infection. We show that influenza virus executes a two-pronged attack on host transcription. First, viral infection causes decreased Pol II gene occupancy downstream of transcription start sites. Second, virus-induced cellular stress leads to a catastrophic failure of Pol II termination at poly(A) sites, with transcription often continuing for tens of kilobases. Defective Pol II termination occurs independently of the ability of the viral NS1 protein to interfere with host mRNA processing. Instead, this termination defect is a common effect of diverse cellular stresses and underlies the production of previously reported downstream-of-gene transcripts (DoGs). Our work has implications for understanding not only host-virus interactions but also fundamental aspects of mammalian transcription. Copyright © 2018 The Author(s). Published by Elsevier Inc. All rights reserved.

  14. Long working hours and occupational stress-related cardiovascular attacks among middle-aged workers in Japan.

    Science.gov (United States)

    Uehata, T

    1991-12-01

    Two hundred and three Karoshi victims who suffered cardiovascular attacks and for whom workers' compensations was claimed were surveyed. These cases were 196 males and 7 females in middle age, and comprised 123 strokes, 50 acute cardiac failures, 27 myocardial infarctions and 4 aortic ruptures. As a sociomedical background, it was shown that two-thirds of them were working for long hours such as more than 60 hr per week, more than 50 hr overtime per month, or more than half of their fixed holidays before the attack. Moreover, among the white-collar workers, these long working hours were accompanied with other stressful work issues such as career problems, excessive business trips, strident norms, and changes of work places; among the blue-collar workers, they were accompanied with those such as irregular midnight work, insufficient manpower and long-distance driving, etc. On the other hand, eighty-eight cases of them experienced several minor and sudden events including work-related emotional anxiety or excitement, rapid increase of workload, unexpected work trouble or environmental changes of work places anticipated at least within 24 hr directly before the attack. It was concluded that Karoshi, meaning fatal attacks by overload, was one of the work-related diseases mainly triggered by long working hours.

  15. Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization.

    Science.gov (United States)

    Hamby, Sherry; Blount, Zach; Smith, Alli; Jones, Lisa; Mitchell, Kimberly; Taylor, Elizabeth

    2018-01-01

    Many forms of victimization, including bullying and property crime, are increasingly moving online, but most studies of poly-victimization still primarily focus on in-person crime and violence. Few studies have examined the importance of incorporating technology-based victimizations for assessing the true burden of violence. The purpose of this study is to explore whether digital poly-victimization contributes to post-traumatic stress and anxiety/dysphoria symptoms after controlling for in-person poly-victimization. Given that technology use and technology-based victimization are changing rapidly, a mixed methods approach was adopted. In the first two phases, focus groups and cognitive interviews (89 total participants) were used to identify the range of digital victimization and develop the Digital Poly-Victimization Scale. In the third phase, the new measure was included in a community survey (n = 478, 57.5% female; 62.6% earning under $50,000 per year) in a rural Southern region, along with measures of in-person poly-victimization, posttraumatic stress and anxiety/dysphoria symptoms, and other outcomes and personal characteristics. A comprehensive measure of digital poly-victimization indicated that almost 3 in 4 participants (72.3%) had experienced at least one form of digital victimization. The results indicated that digital poly-victimization contributed unique variance to post-traumatic stress and anxiety/dysphoria symptoms (p Digital victimization often presents fewer risks to perpetrators and can be expected to represent an increasing share of the societal burden of violence. Future research on poly-victimization should pay more attention to the role of digital victimization.

  16. A victim-centered approach to justice? Victim satisfaction effects on third-party punishments.

    Science.gov (United States)

    Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M

    2012-10-01

    Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  17. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to

  18. When and Why We See Victims as Responsible: The Impact of Ideology on Attitudes Toward Victims.

    Science.gov (United States)

    Niemi, Laura; Young, Liane

    2016-09-01

    Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.

  19. Personal experience in professional narratives: the role of helpers' families in their work with terror victims.

    Science.gov (United States)

    Shamai, Michal

    2005-06-01

    This article describes research on the narratives of social workers who help terror victims, focusing on the relationship between the helpers' families and their work. Qualitative analysis of three training groups of social workers who are responsible for helping in the event of terror attacks in different parts of Israel, and of three debriefing groups for social workers after terror attacks, reveals that the helpers' families play a role in the narratives constructed by the helpers. Two main themes were identified. The first centers on the interaction between work and the family, and shows that in the situation of a terror attack, the conflict between the two disappears and the family often serves as a support system for the helpers. The second theme refers to the family dimension alone, and focuses on the dichotomy between vitality and loss. The way that family life events affect helpers'professional intervention is described. The findings are discussed in light of Conservation of Resources Theory, the fight-flight response to threat, and the concept of the family as a source of safety and risk taking.

  20. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  1. La victime, acteur de la sécurité ? / The victim, a security actor ?

    Directory of Open Access Journals (Sweden)

    Dieu François

    2012-08-01

    Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.

  2. Proactive Routing Mutation Against Stealthy Distributed Denial of Service Attacks – Metrics, Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat; Halappanavar, Mahantesh; Oehmen, Christopher S.

    2018-04-01

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility on enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.

  3. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  4. Life-threatening asthma attack during prolonged fingolimod treatment: case report

    Directory of Open Access Journals (Sweden)

    Zecca C

    2014-07-01

    Full Text Available Chiara Zecca,1,* Matteo Caporro,1,* Sandor Györik,2 Claudio Gobbi11Neurocenter of Southern Switzerland, Department of Neurology, Ospedale Regionale di Lugano, Lugano, Switzerland; 2Department of Internal Medicine, Ospedale Regionale di Bellinzona, Bellinzona, Switzerland*These authors contributed equally to this workBackground: Fingolimod (FTY mediates bronchoconstriction by interacting with sphingosine-1-phosphate receptors. The majority of the reported adverse respiratory events occur during the first weeks of treatment.Case presentation: A 49-year-old woman developed a life-threatening asthma attack after 6 months of continuous FTY treatment. The adverse event required prolonged hospitalization, and the patient recovered without sequelae after FTY interruption. A history of previous airway hyperreactivity and a concurrent viral respiratory infection possibly acted as predisposing factors.Conclusion: This first description of a severe, life-threatening asthma attack during prolonged FTY treatment suggests the need for long-term clinical surveillance, especially in patients with known predisposing factors.Keywords: multiple sclerosis, bronchial hyper-reactivity

  5. Pattern of external injuries sustained during bomb blast attacks in Karachi, Pakistan from 2000 to 2007.

    Science.gov (United States)

    Surani, Arif Anwar; Ali, Salman; Surani, Asif; Zahid, Sohaib; Shoukat, Akber; Varon, Joseph; Surani, Salim

    2015-07-01

    To evaluate patterns of external injury resulting from bomb blasts in Karachi, and compare the injury profile resulting from explosions in open versus semi-confined blast environments. The retrospective, cross-sectional study was conducted in Karachi and comprised relevant data from January 2000 to October 2007. Casualty medical records and medico-legal certificates of the victims presented to three large public-sector hospitals were evaluated using a self-designed proforma. SPSS 17 was used for statistical analysis. Of the 1146 victims, data of 481(42%) represented the final study sample. Of these, 306(63.6%) were injured in open spaces and 175(36.4%) in semi-confined spaces. Of the 896 recorded injuries, lacerations were encountered as external injury in 427(47.7%) cases, followed by penetrating wounds in 137(15.3%). Lower and upper extremities were injured in 348(38.8%) and 170(19%) victims respectively. Open and semi-confined blast environments produced specific injury pattern and profile (pbomb blast attacks in Karachi demonstrated specific injury patterns and profiles. Further studies are required to account for internal injuries and classification of injuries based on standardised scoring systems.

  6. Victim derogation and victim enhancement as alternate routes to system justification.

    Science.gov (United States)

    Kay, Aaron C; Jost, John T; Young, Sean

    2005-03-01

    Abstract-Numerous studies have documented the potential for victim-blaming attributions to justify the status quo. Recent work suggests that complementary, victim-enhancing stereotypes may also increase support for existing social arrangements. We seek to reconcile these seemingly contradictory findings by proposing that victim derogation and victim enhancement are alternate routes to system justification, with the preferred route depending on the perception of a causal link between trait and outcome. Derogating "losers" (and lionizing "winners") on traits (e.g., intelligence) that are causally related to outcomes (e.g., wealth vs. poverty) serves to increase system justification, as does compensating "losers" (and downgrading "winners") on traits (e.g., physical attractiveness) that are causally unrelated to those outcomes. We provide converging evidence using system-threat and stereotype-activation paradigms.

  7. The dilemmas of victim positioning

    Directory of Open Access Journals (Sweden)

    Dorte Marie Søndergaard

    2015-08-01

    Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.

  8. Interrelationships between LGBT-Based Victimization, Suicide, and Substance Use Problems in a Diverse Sample of Sexual and Gender Minority Men and Women

    Science.gov (United States)

    Mereish, Ethan H.; O'Cleirigh, C; Bradford, Judith B.

    2013-01-01

    Research has documented significant relationships between sexual and gender minority stress and higher rates of suicidality (i.e., suicidal ideation and attempts) and substance use problems. We examined the potential mediating role of substance use problems on the relationship between sexual and gender minority stress (i.e., victimization based on lesbian, gay, bisexual, or transgender identity; LGBT) and suicidality. A non-probability sample of LGBT patients from a community health center (N = 1457) ranged in age 19 to 70 years. Participants reported history of lifetime suicidal ideation and attempts, and substance use problems, as well as experiences of LGBT-based verbal and physical attacks. Substance use problems were a significant partial mediator between LGBT-based victimization and suicidal ideation and between LGBT-based victimization and suicide attempts for sexual and gender minorities. Nuanced gender differences revealed that substance use problems did not significantly mediate the relationship between victimization and suicide attempts for sexual minority men. Substance use problems may be one insidious pathway that partially mediates the risk effects of sexual and gender minority stress on suicidality. Substances might be a temporary and deleterious coping resource in response to LGBT-based victimization, which have serious effects on suicidal ideation and behaviors. PMID:23535038

  9. Exploring the Characteristics of Personal Victims Using the National Crime Victimization Survey

    National Research Council Canada - National Science Library

    Jairam, Shashi

    1998-01-01

    .... Two statistical methods were used to investigate these hypotheses, logistical regression for victimization prevalence, and negative binomial regression for victimization incidence and concentration...

  10. Do other people's plights matter? A genetically informed twin study of the role of social context in the link between peer victimization and children's aggression and depression symptoms.

    Science.gov (United States)

    Brendgen, Mara; Vitaro, Frank; Barker, Edward D; Girard, Alain; Dionne, Ginette; Tremblay, Richard E; Boivin, Michel

    2013-02-01

    Using a genetically informed design, this study examined the additive and interactive effects of genetic risk, personal peer victimization experiences, and peer victimization experienced by others on children's aggression and depression symptoms. Of major interest was whether these effects varied depending on whether or not the victimized others were children's close friends. The sample comprised 197 monozygotic and same-sex dizygotic twin pairs reared together (95 female pairs) assessed in Grade 4. Each twin's victimization experiences and victimization experienced by his or her friends and other classmates were measured using individuals' reports about their own levels of peer victimization. Aggression was assessed using peer nominations, and depression was measured using self-reports. Indicative of a possible social-learning mechanism or the emotional contagion of anger, multilevel regressions showed that personal victimization experiences were related to especially high levels of aggression when close friends where also highly victimized, albeit only in boys. Moreover, in line with social comparison theory, the effect of frequent personal victimization experiences on depressive feelings was much weaker when close friends were also highly victimized than when close friends were not or were only rarely victimized. Finally, a high level of peer victimization experienced by other classmates was related to a lower level of aggression in girls and boys, possibly because of a heightened sense of threat in classrooms where many suffer attacks from bullies. All of these results were independent of children's genetic risk for aggression or depression. Theoretical and practical implications are discussed. (c) 2013 APA, all rights reserved.

  11. Is sexual victimization gender specific?

    DEFF Research Database (Denmark)

    Sundaram, Vanita; Laursen, Bjarne; Helweg-Larsen, Karin

    2008-01-01

    The present study investigates the prevalence of sexual victimization and correlations between sexual victimization and indicators of poor health in two representative samples of men and women in Denmark. Specifically, the authors explore the prevalence of self-reported victimization among...... adolescents (N = 5,829) and adults (N = 3,932) and analyze differences in self-reported health outcomes between male and female victims and corresponding controls. Gender differences are found in the reported prevalence of sexual victimization. Significantly more females than males reported forced sexual...... experiences in both samples. Associations between sexual victimization and poor health outcomes are found for both genders. Comparable patterns of association for men and women are found on a number of variables, particularly those pertaining to risk behavior....

  12. Sexual minority youth victimization and social support: the intersection of sexuality, gender, race, and victimization.

    Science.gov (United States)

    Button, Deeanna M; O'Connell, Daniel J; Gealt, Roberta

    2012-01-01

    In comparison to heterosexual youth, sexual minority youth are more likely to experience victimization. Multiple studies have connected anti-gay prejudice and anti-gay victimization to negative outcomes. Research shows that social support may protect sexual minorities from the harmful effects of anti-gay victimization. However, rates of victimization and the negative outcomes linked to sexual identity within the sexual minority community have been relatively unexplored. Using data from three years of statewide data from heterosexual and sexual minority adolescents in grades 9-12, this study examines victimization, substance use, suicidality, and access to social support by sexuality. Results indicate that sexual minority youth are at increased risk for victimization, substance use, suicidality, and social isolation compared to their heterosexual counterparts. Results also indicate that there is very little bivariate difference within the sexual minority community. Multivariate results indicate differences among sexual minorities' experiences with victimization and substance use.

  13. Hate Crime Victims in Serbia: A Case Study of Context and Social Perceptions

    Directory of Open Access Journals (Sweden)

    Jelena Jokanovic

    2018-06-01

    Full Text Available This article provides an overview of the Republic of Serbia’s legal framework that incorporates strong guarantees for protection from discrimination, national minorities’ rights, and prosecution of (ethnic hate crimes, but also describes a social context loaded with strong prejudices. To illustrate the above, I present a case study of two similar incidents of alleged hate crimes reported in a local Serbian newspaper. In both cases, the victims were young men belonging to ethnic minorities. In 2015, within a period of two months, a Serb was attacked in the Croatian capital, Zagreb, and an Albanian-speaking man in the Serbian town, Novi Sad. The articles attracted online comments, 205 and 134 respectively, mostly from readers from Serbia. These comments elicited what are likely to be honest responses because of the relative anonymity provided to authors. By analyzing commentaries on these newspaper items, this article compares social responses to hate crime cases where victims belonged to different ethnic groups and where the incidents occurred in different geographic and social contexts.

  14. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    Directory of Open Access Journals (Sweden)

    Stevković Ljiljana

    2013-01-01

    Full Text Available Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization. Empirical analysis of the criminological consequences of early violent victimization in adulthood are an exception in scientific studies in Serbia. The aim of the paper is to present the results of research into the influence of early violent victimization on violent crime of adult men and women. After the introduction a brief overview of the worldwide research confirming the correlation between the experience of violent victimization and subsequent violent behavior is given. The results of the research conducted by the author will then be discussed. The results illustrate the possibility of predicting violent criminal behavior in adulthood based on indicators of direct and indirect victimization in childhood. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  15. Parenting behavior and the risk of becoming a victim and a bully/victim: a meta-analysis study.

    Science.gov (United States)

    Lereya, Suzet Tanya; Samara, Muthanna; Wolke, Dieter

    2013-12-01

    Being bullied has adverse effects on children's health. Children's family experiences and parenting behavior before entering school help shape their capacity to adapt and cope at school and have an impact on children's peer relationship, hence it is important to identify how parenting styles and parent-child relationship are related to victimization in order to develop intervention programs to prevent or mitigate victimization in childhood and adolescence. We conducted a systematic review of the published literature on parenting behavior and peer victimization using MEDLINE, PsychINFO, Eric and EMBASE from 1970 through the end of December 2012. We included prospective cohort studies and cross-sectional studies that investigated the association between parenting behavior and peer victimization. Both victims and those who both bully and are victims (bully/victims) were more likely to be exposed to negative parenting behavior including abuse and neglect and maladaptive parenting. The effects were generally small to moderate for victims (Hedge's g range: 0.10-0.31) but moderate for bully/victims (0.13-0.68). Positive parenting behavior including good communication of parents with the child, warm and affectionate relationship, parental involvement and support, and parental supervision were protective against peer victimization. The protective effects were generally small to moderate for both victims (Hedge's g: range: -0.12 to -0.22) and bully/victims (-0.17 to -0.42). Negative parenting behavior is related to a moderate increase of risk for becoming a bully/victim and small to moderate effects on victim status at school. Intervention programs against bullying should extend their focus beyond schools to include families and start before children enter school. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Harassment, stalking, threats and attacks targeting New Zealand politicians: A mental health issue.

    Science.gov (United States)

    Every-Palmer, Susanna; Barry-Walsh, Justin; Pathé, Michele

    2015-07-01

    Due to the nature of their work, politicians are at greater risk of stalking, harassment and attack than the general population. The small, but significantly elevated risk of violence to politicians is predominantly due not to organised terrorism or politically motivated extremists but to fixated individuals with untreated serious mental disorders, usually psychosis. Our objective was to ascertain the frequency, nature and effects of unwanted harassment of politicians in New Zealand and the possible role of mental illness in this harassment. New Zealand Members of Parliament were surveyed, with an 84% response rate (n = 102). Quantitative and qualitative data were collected on Parliamentarians' experiences of harassment and stalking. Eighty-seven percent of politicians reported unwanted harassment ranging from disturbing communications to physical violence, with most experiencing harassment in multiple modalities and on multiple occasions. Cyberstalking and other forms of online harassment were common, and politicians felt they (and their families) had become more exposed as a result of the Internet. Half of MPs had been personally approached by their harassers, 48% had been directly threatened and 15% had been attacked. Some of these incidents were serious, involving weapons such as guns, Molotov cocktails and blunt instruments. One in three politicians had been targeted at their homes. Respondents believed the majority of those responsible for the harassment exhibited signs of mental illness. The harassment of politicians in New Zealand is common and concerning. Many of those responsible were thought to be mentally ill by their victims. This harassment has significant psychosocial costs for both the victim and the perpetrator and represents an opportunity for mental health intervention. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  17. Sudden death victims

    NARCIS (Netherlands)

    Ceelen, Manon; van der Werf, Christian; Hendrix, Anneke; Naujocks, Tatjana; Woonink, Frits; de Vries, Philip; van der Wal, Allard; Das, Kees

    2015-01-01

    The goal of this study was to ascertain accordance between cause of death established by the forensic physician and autopsy results in young sudden death victims in the Netherlands. Sudden death victims aged 1-45 years examined by forensic physicians operating in the participating regions which also

  18. Possibilities for Hospital Treatment of Industrial Accident Victims in Military Medical Academy

    International Nuclear Information System (INIS)

    Todorovic, V.; Jevtic, M.; Jovanovic, D.; Jovic-Stosic, J.

    2007-01-01

    Possibility of mass injuries in traffic, industrial accidents or terrorist attack is every day reality. Management of victims may need complex measures including activities on the site, transportation, and hospital care. Preparedness for hospital treatment of mass trauma or poisoning is among the main duties of Military Medical Academy (MMA). It is medical institution of tertiary level with the capacity of 1214 beds in 13 surgical clinics, 12 internal medicine clinics, 2 neuropsychiatry clinics, poison control centre and organ transplantation centre. National Poison Control Centre is the only specialized institution for treatment of adult's acute poisonings in the country. Centre includes: 1. Clinic of Toxicology and Clinical Pharmacology with Intensive Care Unit and Toxicology Information Department; 2. Institute of Experimental Toxicology and Pharmacology; 3. Mobile Toxicological - Chemical Squad. Being a part of MMA, Centre benefits from all advantages of central type hospital, including possibilities for contemporary diagnostic and therapeutic procedures of different specialities, and other necessary medical and logistic support. Except hospital organization and preparedness for admission of mass injuries victims, one of strategic goals of MMA is functional integration in civilian health care system including more detailed planning for collaboration in case of chemical accidents.(author)

  19. A latent class analysis of bullies, victims and aggressive victims in Chinese adolescence: relations with social and school adjustments.

    Directory of Open Access Journals (Sweden)

    Aihui Shao

    Full Text Available This study used the latent class analysis (LCA to identify and classify Chinese adolescent children's aggressive behaviors. It was found that (1 Adolescent children could be divided into four categories: general children, aggressive children, victimized children and aggressive victimized children. (2 There were significant gender differences among the aggressive victimized children, the aggressive children and the general children. Specifically, aggressive victimized children and aggressive children had greater probabilities of being boys; victimized children had equal probabilities of being boys or girls. (3 Significant differences in loneliness, depression, anxiety and academic achievement existed among the aggressive victims, the aggressor, the victims and the general children, in which the aggressive victims scored the worst in all questionnaires. (4 As protective factors, peer and teacher supports had important influences on children's aggressive and victimized behaviors. Relative to general children, aggressive victims, aggressive children and victimized children had lower probabilities of receiving peer supports. On the other hand, compared to general children, aggressive victims had lower probabilities of receiving teacher supports; while significant differences in the probability of receiving teacher supports did not exist between aggressive children and victimized children.

  20. Shilling Attack Prevention for Recommender Systems Using Social-based Clustering

    KAUST Repository

    Lee, Tak

    2011-06-06

    A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for recommender system is Collaborative Filtering (CF). CF uses other users\\' profiles to predict whether a user is interested in a particular object. This system, however, is vulnerable to malicious users seeking to promote items by manipulating rating predictions with fake user profiles. Profiles with behaviors similar to "victim" users alter the prediction of a Recommender System. Manipulating rating predictions through injected profiles is referred to as a shilling attack. It is important to develop shilling attack prevention frameworks for to protect the trustworthiness of Recommender Systems. In this thesis, we will demonstrate a new methodology that utilizes social information to prevent malicious users from manipulating the prediction system. The key element in our new methodology rests upon the concept of trust among real users, an element we claim absent among malicious profiles. In order to use trust information for shilling attack prevention, we first develop a weighting system which makes the system rely more on trustworthy users when making predictions. We then use this trust information to cluster out untrustworthy users to improve rating robustness. The robustness of the new and classic systems is then evaluated with data from a public commercial consumer RS, Epinions.com. Several complexity reduction procedures are also introduced to make implementing the algorithms mentioned possible for a huge commercial database.

  1. The effects of single-sex versus coeducational schools on adolescent peer victimization and perpetration.

    Science.gov (United States)

    Gee, Kevin A; Cho, Rosa Minhyo

    2014-12-01

    Bullying is a growing public health concern for South Korean adolescents. In our quantitative investigation, we analyze the frequency with which Korean adolescents in single-sex versus coeducational schools are targets of or engage in three peer aggressive behaviors (verbal, relational (social exclusion), and physical (including theft)). We use two nationally representative datasets, the 2011 Trends in International Mathematics and Science Study (TIMSS) and the 2005 Korea Education Longitudinal Study (KELS), and rely on propensity score matching (PSM). For adolescent girls, we find that being in all-girls schools mitigates both their exposure to and engagement in peer victimization. For adolescent boys, we find that boys in all-boys schools have significantly higher odds of experiencing more frequent verbal and physical attacks versus their counterparts in coeducational schools. Our findings strongly suggest that interventions to mitigate peer victimization and aggression in Korea should consider the gendered schooling contexts in which they are implemented. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  2. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  3. [Minor Victims of Violent Acts in the Context of the Victim Reparation Law].

    Science.gov (United States)

    Hellwig, Katharina; Kröger, Christoph; Franke, Stefanie; Wehrmeyer, Matthias; Heinrichs, Nina

    2018-03-01

    A descriptive analysis of victim compensation applications for children and adolescents as well as sociodemographic and trauma-specific information concerning victims and perpetrators. We did analysis of 100 victim-compensation application files based on a self-developed category system. The files included solely interpersonal trauma, 59 % of which are type II trauma. The most frequent form is sexual violence. The perpetrators stem mostly from children’s homes or peripherals. 79 % of the victims received a diagnosis of a mental disorder, most often posttraumatic stress disorder. Sexually abused children and adolescents make up the majority of the target population in OEG-related trauma outpatient units. Such outpatient units should therefore offer a specific expertise in treating sexually abused children and adolescents.

  4. Victims of cyberstalking in Serbia

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina

    2009-01-01

    Full Text Available The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.

  5. Secondary victims of rape

    DEFF Research Database (Denmark)

    Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask

    2012-01-01

    secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...

  6. Support for victims of crime: Analysis of the VDS info and victim support service in 2010

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2011-01-01

    Full Text Available VDS info and victim support service is a victim support service, which was established in 2003 within the Victimology Society of Serbia. The service provides emotional support, information and, if necessary, referral to other relevant services, as well as witness support. The target group of the service are direct and indirect victims of all forms of crime, of both sexes, regardless of any personal characteristics. In addition, support is provided to victims in court, as well as to women victims of violence who are in prison. In most cases victim support is provided by volunteers who are trained to work with victims of crime. This paper analyzes the work of the service in 2010. Special attention is paid to the problems of workplace violence and domestic violence, which are the most common reasons for contacting the service. The aim of the paper is to present the work of the service in the past year, as well as to highlight the trends observed in comparison to the previous period.

  7. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  8. Justice And Legal Certainty For Child Victims

    Directory of Open Access Journals (Sweden)

    Edi Setiadi

    2016-12-01

    Full Text Available Focus of attention in the criminal justice system so far has always been to the perpetrator, whereas parties related to a process of criminal justice encompasses the perpetrator, the victim, and the community. A crime victim, in particular, would suffer more since he/she could experience secondary victimization in the criminal justice system. The law concerning victim and witness protection only states the limitation for the criminal victim to ask for compensation to criminal justice system, either as a victim of direct criminal or a victim of abuse power done by law enforcement officers. Child victims are treated the same way as to adult victims, whilst they have a greater dimension of the problem and effects to be dealt with Mechanism and procedures to be followed are ius constituendum (intended/desirable law, as they only share expectation of indemnity, compensation, and rehabilitation which have not been empirically tested in a real situation.

  9. Big Five Personality Traits of Cybercrime Victims.

    Science.gov (United States)

    van de Weijer, Steve G A; Leukfeldt, E Rutger

    2017-07-01

    The prevalence of cybercrime has increased rapidly over the last decades and has become part of the everyday life of citizens. It is, therefore, of great importance to gain more knowledge on the factors related to an increased or decreased likelihood of becoming a cybercrime victim. The current study adds to the existing body of knowledge using a large representative sample of Dutch individuals (N = 3,648) to study the relationship between cybercrime victimization and the key traits from the Big Five model of personality (i.e., extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience). First, multinomial logistic regression analyses were used to examine the associations between the personality traits and three victim groups, that is, cybercrime victims versus nonvictims, traditional crime victims versus nonvictims, and cybercrime victims versus traditional crime victims. Next, logistic regression analyses were performed to predict victimization of cyber-dependent crimes (i.e., hacking and virus infection) and cyber-enabled crimes (i.e., online intimidation, online consumer fraud, and theft from bank account). The analyses show that personality traits are not specifically associated with cybercrime victimization, but rather with victimization in general. Only those with higher scores on emotional stability were less likely to become a victim of cybercrime than traditional crime. Furthermore, the results indicate that there are little differences between personality traits related to victimization of cyber-enabled and cyber-dependent crimes. Only individuals with higher scores on openness to experience have higher odds of becoming a victim of cyber-enabled crimes.

  10. Do victims only cry? Victim-survivors and their grassroots organizations in Peru

    NARCIS (Netherlands)

    de Waardt, M.F.; Ouweneel, A.

    2012-01-01

    De Waardt discusses associations of victims of the 1980s violent conflict in Peru, which she relates to the Peruvian cultural tradition of grassroots organizations. She conveys the substantial existence of victim-survivor associations, the social support its members find amongst each other, and the

  11. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  12. Understanding Risk-taking Behavior in Bullies, Victims, and Bully Victims Using Cognitive- and Emotion-Focused Approaches.

    Science.gov (United States)

    Poon, Kean

    2016-01-01

    Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth's overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully victim). This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and an emotion-focused model of risk taking, and to clarify how adolescents' characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age = 14.5, M = 65, F = 71) were recruited and grouped according to bullying identity: Bully ( n = 27), Victim ( n = 20), Bully victim ( n = 37) and Control ( n = 52). Cognitive Appraisal of Risky Events (CARE) questionnaire was used to measure participants' expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT) was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  13. Understanding risk-taking behavior in bullies, victims, and bully-victims using cognitive- and emotion-focused approaches.

    Directory of Open Access Journals (Sweden)

    Kean Poon

    2016-11-01

    Full Text Available Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth’s overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully-victim. This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and a emotion-focused model of risk taking, and to clarify how adolescents’ characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age =14.5, M= 65, F =71 were recruited and grouped according to bullying identity: Bully (n =27, Victim (n =20, Bully-victim (n =37 and Control (n =52. Cognitive Appraisal of Risky Events (CARE questionnaire was used to measure participants’ expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully-victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully-victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully-victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  14. Why the bully/victim relationship is so pernicious: a gendered perspective on power and animosity among bullies and their victims.

    Science.gov (United States)

    Rodkin, Philip C; Hanish, Laura D; Wang, Shuai; Logis, Handrea A

    2014-08-01

    The bully/victim relationship was studied in a sample of elementary school children (N = 1,289 in first, third, and fifth grades). Three questions were tested. Does bullying involve a power differential between bully and victim? Are bully/victim dyads participants in a relationship, whether mutual liking or disliking? Does the gender composition of the bully/victim dyad moderate power differential and relational context patterns? Hierarchical linear modeling was used to analyze predictors of the reputational strength of bully/victim ties. The findings revealed that the bully/victim dyads most frequently nominated by peers were characterized by asymmetries in social status, where bullies were increasingly more popular than their victims, and by asymmetries in aggression, where bullies were increasingly less aggressive than their victims. Bullies and victims were likely to select one another as among the children that they least like. Most effects with respect to aggression, popularity, and relationships were moderated by the gender composition of the bully/victim dyad. Implications for a developmental psychopathology perspective on peer bullying and victimization are highlighted.

  15. Viral epidemiology of the adult Apis Mellifera infested by the Varroa destructor mite

    OpenAIRE

    Bernardi, Sara; Venturino, Ezio

    2016-01-01

    The ectoparasitic mite Varroa destructor has become one of the major worldwide threats for apiculture. Varroa destructor attacks the honey bee Apis mellifera weakening its host by sucking hemolymph. However, the damage to bee colonies is not strictly related to the parasitic action of the mite but it derives, above all, from its action as vector increasing the transmission of many viral diseases such as acute paralysis (ABPV) and deformed wing viruses (DWV), that are considered among the main...

  16. Peer Victimization and Dating Violence Victimization: The Mediating Role of Loneliness, Depressed Mood, and Life Satisfaction.

    Science.gov (United States)

    Cava, María-Jesús; Buelga, Sofía; Tomás, Inés

    2018-03-01

    Peer victimization and dating violence victimization have serious negative effects on adolescents' health, and they seem to be related. However, the mediating processes in this relationship have not been sufficiently analyzed. The purpose of this study was to analyze the direct and indirect relationships between peer victimization and dating violence victimization, considering the possible mediator role of loneliness, depressed mood, and life satisfaction. These relationships are analyzed in boys and girls, and in early and middle adolescence. From an initial sample of 1,038 Spanish adolescents, those who had or had had in the past 12 months a dating relationship (647 adolescents; 49.1% boys, M = 14.38, SD = 1.43) were included in this study. Multigroup structural equation modeling was used to test a double mediation model simultaneously for boys and girls, testing the invariance of the relationships among variables across genders. The same technique was used to test the model simultaneously for early and middle adolescence, testing the invariance of the relationships among variables across age groups. Results revealed a positive direct relationship between peer victimization and dating violence victimization, as well as the partial mediating role of loneliness and life satisfaction in this relationship. The mediator role of depressed mood was not supported. The same mediational model was confirmed in boys and girls, and in early and middle adolescence. These results highlight the important role of loneliness and life satisfaction to explain the link between peer victimization and dating violence victimization in adolescence. These findings may be useful for developing intervention programs aimed at preventing situations of multiple victimization during adolescence.

  17. Viral diseases of marine invertebrates

    Science.gov (United States)

    Johnson, P. T.

    1984-03-01

    Approximately 40 viruses are known from marine sponges; turbellarian and monogenetic flatworms; cephalopod, bivalve, and gastropod mollusks; nereid polychaetes; and isopod and decapod crustaceans. Most of the viruses can be tentatively assigned to the Herpesviridae, Baculoviridae, Iridoviridae, Adenoviridae, Papovaviridae, Reoviridae, “Birnaviridae”, Bunyaviridae, Rhabdoviridae, and Picornaviridae. Viruslike particles found in oysters might be representatives of the Togaviridae and Retroviridae. Enveloped single-stranded RNA viruses from crustaceans have developmental and morphological characteristics intermediate between families, and some show evidence of relationships to the Paramyxoviridae as well as the Bunyaviridae or Rhabdoviridae. Certain small viruses of shrimp cannot be assigned, even tentatively, to a particular family. Some viruses cause disease in wild and captive hosts, others are associated with disease states but may not be primary instigators, and many occur in apparently normal animals. The frequency of viral disease in natural populations of marine invertebrates is unknown. Several viruses that cause disease in captive animals, with or without experimental intervention, have also been found in diseased wild hosts, including herpeslike viruses of crabs and oysters, iridovirus of octopus, and reolike and bunyalike viruses of crabs. Iridolike viruses have been implicated in massive mortalities of cultured oysters. Baculoviruses, and IHHN virus, which is of uncertain affinities, cause economically damaging diseases in cultured penaeid shrimp. Double or multiple viral infection is common in crabs. For example, a reolike virus and associated rhabdolike virus act synergistically to cause paralytic and fatal disease in Callinectes sapidus. Information on host range, most susceptible stage, and viral latency is available only for viruses of shrimp. One baculovirus attacks five species of New World penaeid shrimp. IHHN virus infects three species of

  18. Adolescent sexual victimization

    DEFF Research Database (Denmark)

    Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P

    2012-01-01

    at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early......The present study set out to investigate predictors of first time adolescent peer-on-peer sexual victimization (APSV) among 238 female Grade 9 students from 30 schools in Denmark. A prospective research design was utilized to examine the relationship among five potential predictors as measured...... sexual onset and failing to signal sexual boundaries did not. The present study identifies specific risk factors for first time sexual victimization that are potentially changeable. Thus, the results may inform prevention initiatives targeting initial experiences of APSV....

  19. Victimization of Obese Adolescents

    Science.gov (United States)

    Robinson, Sabrina

    2006-01-01

    Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…

  20. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  1. Cyberbullying victimization in adolescents’ population

    Directory of Open Access Journals (Sweden)

    Nešić Marija

    2016-01-01

    Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.

  2. Bystander Involvement in Peer Victimization: The Value of Looking beyond Aggressors and Victims

    Science.gov (United States)

    Wiens, Brenda A.; Dempsey, Allison

    2009-01-01

    Peer victimization has been a focus of both research and prevention program development. This construct is typically measured from the victim and aggressor perspectives. However, prevention programming often includes an additional bystander perspective. The present study evaluated whether questions regarding witnessing peer victimization…

  3. Decreases in the proportion of bullying victims in the classroom: Effects on the adjustment of remaining victims

    NARCIS (Netherlands)

    Garandeau, C.F.; Lee, Ihno A.; Salmivalli, Christina

    2018-01-01

    Sharing a classroom environment with other victimized peers has been shown to mitigate the adverse effects of peer victimization on children’s social and psychological adjustment. By extension, this study hypothesized that classroom reductions in the proportion of victims would be harmful for

  4. Latent classes of childhood poly-victimization and associations with suicidal behavior among adult trauma victims: Moderating role of anger.

    Science.gov (United States)

    Charak, Ruby; Byllesby, Brianna M; Roley, Michelle E; Claycomb, Meredith A; Durham, Tory A; Ross, Jana; Armour, Cherie; Elhai, Jon D

    2016-12-01

    The aims of the present study were first to identify discrete patterns of childhood victimization experiences including crime, child maltreatment, peer/sibling victimization, sexual violence, and witnessing violence among adult trauma victims using latent class analysis; second, to examine the association between class-membership and suicidal behavior, and third to investigate the differential role of dispositional anger on the association between class-membership and suicidal behavior. We hypothesized that those classes with accumulating exposure to different types of childhood victimization (e.g., poly-victimization) would endorse higher suicidal behavior, than the other less severe classes, and those in the most severe class with higher anger trait would have stronger association with suicidal behavior. Respondents were 346 adults (N=346; M age =35.0years; 55.9% female) who had experienced a lifetime traumatic event. Sixty four percent had experienced poly-victimization (four or more victimization experiences) and 38.8% met the cut-off score for suicidal behavior. Three distinct classes emerged namely, the Least victimization (Class 1), the Predominantly crime and sibling/peer victimization (Class 2), and the Poly-victimization (Class 3) classes. Regression analysis controlling for age and gender indicated that only the main effect of anger was significantly associated with suicidal behavior. The interaction term suggested that those in the Poly-victimization class were higher on suicidal behavior as a result of a stronger association between anger and suicidal behavior in contrast to the association found in Class 2. Clinical implications of findings entail imparting anger management skills to facilitate wellbeing among adult with childhood poly-victimization experiences. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Victimization, polyvictimization , and health in Swedish adolescents

    Directory of Open Access Journals (Sweden)

    Aho N

    2016-08-01

    Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC

  6. Victim's Rights - Comparative Approach within EU Legislation

    Directory of Open Access Journals (Sweden)

    Monica Pocora

    2015-12-01

    Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.

  7. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  8. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  9. Punishment goals of crime victims.

    Science.gov (United States)

    Orth, Uli

    2003-04-01

    Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.

  10. Nucleocapsid-Independent Specific Viral RNA Packaging via Viral Envelope Protein and Viral RNA Signal

    OpenAIRE

    Narayanan, Krishna; Chen, Chun-Jen; Maeda, Junko; Makino, Shinji

    2003-01-01

    For any of the enveloped RNA viruses studied to date, recognition of a specific RNA packaging signal by the virus's nucleocapsid (N) protein is the first step described in the process of viral RNA packaging. In the murine coronavirus a selective interaction between the viral transmembrane envelope protein M and the viral ribonucleoprotein complex, composed of N protein and viral RNA containing a short cis-acting RNA element, the packaging signal, determines the selective RNA packaging into vi...

  11. The victim of the nuclear accident

    International Nuclear Information System (INIS)

    Carvalho, A.B. de.

    1990-01-01

    This paper shows the effects of the nuclear accident in the victims, in their lives, changes in the behaviour, neurosis including all the psychological aspects. The author compare the victims with nuclear accident like AIDS patients, in terms of people's discrimination. There is another kind of victims. They are the people who gave helpness, for example physicians, firemen and everybody involved with the first aids that suffer together with the victims trying to safe them and to diminish their suffering, combating the danger, the discrimination and the no information. (L.M.J.)

  12. Victims of crime, with special emphasis on victims of work abuse and domestic violence: Analysis of the service VDS info and victim support for 2009

    Directory of Open Access Journals (Sweden)

    Radaković Danica

    2010-01-01

    Full Text Available The aim of this paper is to present the work of the VDS info and victim support service for the period January 1st 2009 - December 31st 2009. It contains the data about victims, type and quality of assistance and support provided by the Service, and also about institutions and organizations the victims contacted before or after contacting the Service and their satisfaction with the help they received.

  13. Bullying and Victimization Among Children

    Science.gov (United States)

    Shetgiri, Rashmi

    2013-01-01

    Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839

  14. Maladaptive schemas as mediators of the relationship between previous victimizations in the family and dating violence victimization in adolescents.

    Science.gov (United States)

    Calvete, Esther; Gámez-Guadix, Manuel; Fernández-Gonzalez, Liria; Orue, Izaskun; Borrajo, Erika

    2018-07-01

    This study examined whether exposure to family violence, both in the form of direct victimization and witnessing violence, predicted dating violence victimization in adolescents through maladaptive schemas. A sample of 933 adolescents (445 boys and 488 girls), aged between 13 and 18 (M = 15.10), participated in a three-year longitudinal study. They completed measures of exposure to family violence, maladaptive schemas of disconnection/rejection, and dating violence victimization. The findings indicate that witnessing family violence predicts the increase of dating violence victimization over time, through the mediation of maladaptive schemas in girls, but not in boys. Direct victimization in the family predicts dating violence victimization directly, without the mediation of schemas. In addition, maladaptive schemas contribute to the perpetuation of dating violence victimization over time. These findings provide new opportunities for preventive interventions, as maladaptive schemas can be modified. Copyright © 2018 Elsevier Ltd. All rights reserved.

  15. Conceptual model of acid attacks based on survivor's experiences: Lessons from a qualitative exploration.

    Science.gov (United States)

    Sabzi Khoshnami, Mohammad; Mohammadi, Elham; Addelyan Rasi, Hamideh; Khankeh, Hamid Reza; Arshi, Maliheh

    2017-05-01

    Acid attack, a worldwide phenomenon, has been increasing in recent years. In addition to severe injuries to the face and body, such violence leads to psychological and social problems that affect the survivors' quality of life. The present study provides a more in-depth understanding of this phenomenon and explores the nature and dimensions of acid attacks based on survivors' experiences. A grounded theory study using semi-structured, recorded interviews and applying purposeful theoretical sampling was conducted with 12 acid attack survivors in Iran. Data were analysed using constant comparison in open, axial and selective coding stages. A conceptual model was developed to explain the relationships among the main categories extracted through the grounded theory study. Physical and psychological wounds emerged as a core category. Traditional context and extreme beauty value in society acted as the context of the physical and psychological wounds experienced. Living with a drug abuser with behavioural disorders and lack of problem-solving skills in interpersonal conflict were found to be causal conditions. Action strategies to deal with this experience were found to be composed of individual, interpersonal and structural levels. Education, percentage and place of burning acted as intervening conditions that influenced survivors' strategies. Finally, adverse consequences of social deprivation and feeling helpless and hindered were found to have an important impact. Acid attack lead to physical and psychological wounds in survivors. This is a multi-dimensional phenomenon involving illness, disability, and victimization, and requires a wide range of strategies at different levels. The conceptual model derived through this study can serve as a good basis for intervention programs. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  16. Sexual Victimization of Youth

    Science.gov (United States)

    Small, Kevonne; Zweig, Janine M.

    2007-01-01

    An estimated 7.0% to 8.1% of American youth report being sexually victimized at some point in their life time. This article presents a background to youth sexual victimization, focusing on prevalence data, challenging issues when studying this problem, risk factors, and common characteristics of perpetrators. Additionally, a type of sexual…

  17. Attracting Assault: Victims' Nonverbal Cues.

    Science.gov (United States)

    Grayson, Betty; Stein, Morris I.

    1981-01-01

    Describes a study in which prison inmates convicted of assault identified potential victims from videotapes. A lab analysis code was used to determine which nonverbal body movement categories differentiated victims and nonvictims. (JMF)

  18. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  19. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  20. Viral Hepatitis

    Science.gov (United States)

    ... Home A-Z Health Topics Viral hepatitis Viral hepatitis > A-Z Health Topics Viral hepatitis (PDF, 90 ... liver. Source: National Cancer Institute Learn more about hepatitis Watch a video. Learn who is at risk ...

  1. Prevention of victimization following sexual assaults

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria; Sidenius, Katrine

    2004-01-01

    Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...... of women exposed to sexualized coercion and the diversity of perspectives on the events....

  2. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Identifying bully victims: definitional versus behavioral approaches.

    Science.gov (United States)

    Green, Jennifer Greif; Felix, Erika D; Sharkey, Jill D; Furlong, Michael J; Kras, Jennifer E

    2013-06-01

    Schools frequently assess bullying and the Olweus Bully/Victimization Questionnaire (BVQ; Olweus, 1996) is the most widely adopted tool for this purpose. The BVQ is a self-report survey that uses a definitional measurement method--describing "bullying" as involving repeated, intentional aggression in a relationship where there is an imbalance of power and then asking respondents to indicate how frequently they experienced this type of victimization. Few studies have examined BVQ validity and whether this definitional method truly identifies the repetition and power differential that distinguish bullying from other forms of peer victimization. This study examined the concurrent validity of the BVQ definitional question among 435 students reporting peer victimization. BVQ definitional responses were compared with responses to a behavioral measure that did not use the term "bullying" but, instead, included items that asked about its defining characteristics (repetition, intentionality, power imbalance). Concordance between the two approaches was moderate, with an area under the receiver operating curve of .72. BVQ responses were more strongly associated with students indicating repeated victimization and multiple forms of victimization, than with power imbalance in their relationship with the bully. Findings indicate that the BVQ is a valid measure of repeated victimization and a broad range of victimization experiences but may not detect the more subtle and complex power imbalances that distinguish bullying from other forms of peer victimization. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  4. Victimization and pain

    Directory of Open Access Journals (Sweden)

    Małgorzata K. Szerla

    2013-12-01

    Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.

  5. Attitudes toward victim and victimization in the light of the just world theory

    Directory of Open Access Journals (Sweden)

    Simeunović-Patić Biljana

    2017-01-01

    Full Text Available The present paper discusses current empirical status of the Just world theory introduced several decades ago by Melvin Lerner, the content and functions of a just world belief as its central construct, and particularly, the relation between a just world belief and victim blaming and victim derogation phenomena. In the light of existing research evidence, a just world belief and a need to re-establish a “justice” when this belief is threatened, is considered to be an adaptive mechanism that protect a belief that a world is secure and the future is predictable, as well as a confidence in the purposefulness of selfdiscipline, long-term personal investments and social rules respecting. As proposed By the just world theory, when a person faces injustice, i.e. others’ (innocent victims’ suffering, his/her belief in a just world is threatened. Possible reactions to that threat comprise various rational victim helping activities, but also specific cognitive defensive strategies, including cognitive distortion, rationalization and reinterpretation of an event in order to minimize injustice or deny injustice happened at all. In the course of reinterpretation of injustice, victims are often blamed for their former actions, or derogated for their character, in order to indicate them responsible for their own fate and suffering. The findings of research studies suggest that the likelihood of employing cognitive defensive strategies rises if formal responses to crime and victimization lack or fail. This further suggests that an efficient and effective formal social response in terms of both sanctioning of offenders and reparation of victims should be considered highly important in reducing the risk of stigmatization and rejection of victims. Finally, the paper discusses the role of victim’s just world beliefs in post-trauma adaptation and coping processes. In virtue of findings from the existing research literature it may be concluded that victim

  6. Victims of Rape: Repeated Assessment of Depressive Symptoms.

    Science.gov (United States)

    Atkeson, Beverly M.; And Others

    1982-01-01

    Investigated depressive symptoms in rape victims (N=115) for one year following their assaults. Depressive symptoms were higher in victims than in controls. By four months postrape, depressive symptoms in the victim group had diminished, and the victims were no longer significantly different from the nonvictim control group. (Author)

  7. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  8. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  9. Predictors and protective factors for adolescent Internet victimization

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving

    2012-01-01

    To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....

  10. Crime victims in the criminal justice system

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2003-01-01

    Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.

  11. Perpetrator or victim?

    DEFF Research Database (Denmark)

    Hansen, Helle Rabøl

    Paper 3: HAN091384 Victim, Perpetrator and Pupil - Teacher Perspectives on Peer Bullying Helle Rabøl Hansen, University of Aarhus This paper investigates the approaches and strategies taken up by two crucial actors in relation to bullying in schools: 1. documents indicating school policies...... and identifies a legally informed matrix, which points out unequivocal positions of perpetrators and victims. The policy document mixes the definition practices, which derive from the Olweus tradition on bullying research, into a law informed kind of discourse. Subsequently the policy document iterates...

  12. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  13. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  14. Sexual victimization, partner aggression and alcohol consumption ...

    African Journals Online (AJOL)

    This paper examines the relationship sexual victimization (both childhood sexual victimization and adult sexual victimization), aggression and alcohol consumption. The data for this research is from the Gender, Alcohol and Culture: an International Study (GENACIS). A random sample of 2070 adults (53.8% males and ...

  15. Cyberbullying perpetration and victimization among middle-school students.

    Science.gov (United States)

    Rice, Eric; Petering, Robin; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-03-01

    We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator-victim (i.e., bidirectional cyberbullying behavior). In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator-victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators-victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators-victims. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters.

  16. Cyberbullying Perpetration and Victimization Among Middle-School Students

    Science.gov (United States)

    Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-01-01

    Objectives. We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. Methods. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator–victim (i.e., bidirectional cyberbullying behavior). Results. In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator–victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators–victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators–victims. Conclusions. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters. PMID:25602905

  17. SHE’S NOT A VICTIM! SHE’S MY WIFE! INTIMATE PARTNER VIOLENCE: FUELLED BY DANGEROUS PERPETRATOR ATTITUDES

    Directory of Open Access Journals (Sweden)

    Londt, Marcel

    2014-10-01

    Full Text Available This study used mixed methodology research; chose 53 male and 47 female respondents through purposive sampling, selected intervention research: design and development methodological framework to develop guidelines, used a Canadian Risk Assessment Tool to “assess risk”/“predict dangerousness”. The findings highlighted the need for “risk factor assessment”, showing specific risk factors predicted violence, with sexual violence playing a role. Perpetrators disregard their partners as victims when sexual violence was employed. Qualitative data from female respondents showed that perpetrators use physical assault and sexual violence in their attacks, and their behaviours were fuelled by attitudes that supported/condoned intimate partner violence (IPV.

  18. Impact of sexual harassment victimization by peers on subsequent adolescent victimization and adjustment: a longitudinal study.

    Science.gov (United States)

    Chiodo, Debbie; Wolfe, David A; Crooks, Claire; Hughes, Ray; Jaffe, Peter

    2009-09-01

    To examine gender differences in prevalence and types of sexual harassment victimization experienced in grade 9 and how it contributes to relationship victimization and psychological adjustment 2.5 years later. A total of 1734 students from 23 schools completed self-report surveys at entry to grade 9 and end of grade 11. Self-report data were collected on victimization experiences (sexual harassment, physical dating violence, peer violence, and relational victimization) and adjustment (emotional distress, problem substance use, self-harm, suicidal thoughts, maladaptive dieting, feeling unsafe at school, and perpetration of violent delinquency). Separate analyses by sex were prespecified. Sexual harassment victimization was common among boys (42.4%) and girls (44.1%) in grade 9, with girls reporting more sexual jokes, comments, and unwanted touch than among boys, and with boys reporting more homosexual slurs or receiving unwanted sexual content. For girls, sexual harassment victimization in grade 9 was associated with elevated risk of self-harm, suicidal thoughts, maladaptive dieting, early dating, substance use, and feeling unsafe at school. A similar pattern of risk was found for boys, with the exception of dieting and self-harm behaviors. Adjusted odds ratios (AOR) indicated these students were significantly more likely than nonharassed students to report victimization by peers and dating partners 2.5 years later (AOR for boys and girls, respectively; all p harassment (AOR: 2.45; 2.9), physical dating violence (AOR: 2.02; 3.73), and physical peer violence (AOR: 2.75; 2.79). Gr 9 sexual harassment also contributed significantly to emotional distress (AOR: 2.09; 2.24), problem substance use (AOR: 1.79; 2.04), and violent delinquency perpetration (AOR: 2.1; 3.34) 2.5 years later (boys and girls, respectively; all p harassment at the beginning of high school is a strong predictor of future victimization by peers and dating partners for both girls and boys, and

  19. Responding to Children Victimized by Their Peers

    Science.gov (United States)

    Nickerson, Amanda B.; Brock, Stephen E.; Chang, Yiping; O'Malley, Meagan D.

    2006-01-01

    Because victimization results from the dynamic interplay between the victim and his or her parents, peers, and teachers, responding to this problem should involve both direct and indirect interventions. This paper describes and reviews empirically supported direct interventions with victims, as well as indirect interventions with parents, peers,…

  20. Frequency of victimization experiences and well-being among online, offline and combined victims on social online network sites of German children and adolescents

    Directory of Open Access Journals (Sweden)

    Michael eGlüer

    2015-12-01

    Full Text Available Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,906 German children and adolescents (grades 5 to 10, mean age = 13.9; SD = 2.1 with and without offline or online victimization experiences who participated in a social online network (SNS. Online questionnaires were used to assess previous victimization (offline, online, combined, and without, somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others. In total, 1,362 (71.4% children and adolescents reported being a member of at least one social online network, and 377 students (28.8% reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%, whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  1. Frequency of Victimization Experiences and Well-Being Among Online, Offline, and Combined Victims on Social Online Network Sites of German Children and Adolescents.

    Science.gov (United States)

    Glüer, Michael; Lohaus, Arnold

    2015-01-01

    Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,890 German children and adolescents (grades 5-10, mean age = 13.9; SD = 2.1) with and without offline or online victimization experiences who participated in a social online network (SNS). Online questionnaires were used to assess previous victimization (offline, online, combined, and without), somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others). In total, 1,362 (72.1%) children and adolescents reported being a member of at least one SNS, and 377 students (28.8%) reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%), whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined) was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  2. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  3. Perceptions of teachers' support, safety, and absence from school because of fear among victims, bullies, and bully-victims.

    Science.gov (United States)

    Berkowitz, Ruth; Benbenishty, Rami

    2012-01-01

    This study examines the distribution of the types of involvement in school violence (bullies, victims, bully-victims, and students not involved in violence) among the general population of Israeli school students. The prevalence of these different types of involvement was also examined according to gender, age or school level (junior high vs. high school), and ethnicity (Jewish vs. Arab). Further, the study examines the relationships between type of involvement in school violence and students' perceptions of teachers' support, safety, and absence from school because of fear. Data were obtained from a nationally representative, stratified sample of 13,262 students in grades 7-11 who responded to a self-report questionnaire on victimization by, and perpetration of, school violence and on perceptions of school climate. Data revealed that 3.6% of all students were victims of bullying (18.5% of those involved in violence). The proportion of bully-victims among male students was 6.4% (21.9% of all involved) compared with 1.1% (11.2% of all involved) among females. Bully-victims reported the lowest levels of teacher support and feelings of security and missed school because of fear significantly more often. The results point to the uniqueness of the bully-victim group. This group presents multiple challenges for school staff with these students needing special attention. © 2012 American Orthopsychiatric Association.

  4. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  5. Cytoplasmic viral RNA-dependent RNA polymerase disrupts the intracellular splicing machinery by entering the nucleus and interfering with Prp8.

    Directory of Open Access Journals (Sweden)

    Yen-Chin Liu

    2014-06-01

    Full Text Available The primary role of cytoplasmic viral RNA-dependent RNA polymerase (RdRp is viral genome replication in the cellular cytoplasm. However, picornaviral RdRp denoted 3D polymerase (3D(pol also enters the host nucleus, where its function remains unclear. In this study, we describe a novel mechanism of viral attack in which 3D(pol enters the nucleus through the nuclear localization signal (NLS and targets the pre-mRNA processing factor 8 (Prp8 to block pre-mRNA splicing and mRNA synthesis. The fingers domain of 3D(pol associates with the C-terminal region of Prp8, which contains the Jab1/MPN domain, and interferes in the second catalytic step, resulting in the accumulation of the lariat form of the splicing intermediate. Endogenous pre-mRNAs trapped by the Prp8-3D(pol complex in enterovirus-infected cells were identified and classed into groups associated with cell growth, proliferation, and differentiation. Our results suggest that picornaviral RdRp disrupts pre-mRNA splicing processes, that differs from viral protease shutting off cellular transcription and translation which contributes to the pathogenesis of viral infection.

  6. Social Information Processing Mechanisms and Victimization: A Literature Review.

    Science.gov (United States)

    van Reemst, Lisa; Fischer, Tamar F C; Zwirs, Barbara W C

    2016-01-01

    The aim of the current literature review, which is based on 64 empirical studies, was to assess to what extent mechanisms of the Social Information Processing (SIP) model of Crick and Dodge (1994) are related to victimization. The reviewed studies have provided support for the relation between victimization and several social information processing mechanisms, especially the interpretation of cues and self-efficacy (as part of the response decision). The relationship between victimization and other mechanisms, such as the response generation, was only studied in a few articles. Until now research has often focused on just one step of the model, instead of attempting to measure the associations between multiple mechanisms and victimization in multivariate analyses. Such analyses would be interesting to gain more insight into the SIP model and its relationship with victimization. The few available longitudinal studies show that mechanisms both predict victimization (internal locus of control, negative self-evaluations and less assertive response selection) and are predicted by victimization (hostile attribution of intent and negative evaluations of others). Associations between victimization and SIP mechanisms vary across different types and severity of victimization (stronger in personal and severe victimization), and different populations (stronger among young victims). Practice could focus on these stronger associations and the interpretation of cues. More research is needed however, to investigate whether intervention programs that address SIP mechanisms are suitable for victimization and all relevant populations. © The Author(s) 2014.

  7. Cyber socializing and victimization of women

    Directory of Open Access Journals (Sweden)

    Halder Debarati

    2009-01-01

    Full Text Available Web 2.01 has redefined the virtual life of ordinary individuals and has given wide opportunities to internet users including women to exchange ideas, interact with like minded people and participate in the development of virtual societies as per one's own choices. Social networking websites (SNWs, a segment of Web 2.0 is very popular among the internet users. However, there is a dark side of these SNW's too. They have become havens for offenders to victimize women, the most vulnerable targets in the internet, after children. In this paper, we examine the victimization of women in the social networking websites in general, analyze the trends of such victimization from socio - legal - victimological angle and ascertain the reasons for the growth of such victimization.

  8. Victim support services in England, Wales and Northern Ireland

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2002-01-01

    Full Text Available In the paper, authors tried to present activities of one of the oldest European Victim Support Services - Victim Support for England, Wales and Northern Ireland. During 1970s, through practice and research projects, the need for recognizing the physical and psychological status of victims after the crime was committed, as well as the need of providing them with the (informal assistance and support were noticed. That has resulted in establishing numerous of local victim support services (schemes, which united in the National Association of the Victim Support Services in 1979. Significant support was given to the Service in 1980s through the recommendations of the Council of Europe on the assistance for victims of crime and prevention of victimization through direct support given to the victim immediately after the incident, including protection and safety, medical, mental, social and financial support, as well as providing the victim with information on his/her rights, support during the criminal proceeding, assistance in getting compensation etc. Organization and structure of the service, referral system, code of practice and two main programs: Victim Service and Witness Service are reviewed in the paper.

  9. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  10. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. Self-esteem in adolescent aggression perpetrators, victims and perpetrator-victims, and the moderating effects of depression and family support

    Directory of Open Access Journals (Sweden)

    Peng-Wei Wang

    2013-04-01

    Full Text Available The aims of this study were (1 to examine differences in the level of self-esteem among adolescents with different roles in aggression involvement (aggression perpetrators, victims, perpetrator-victims and neutrals according to gender and (2 to examine the moderating effects of depression and family support on association between aggression involvement and self-esteem. A total of 8085 adolescents in Taiwan completed questionnaires. The relationships between self-esteem and aggression involvement were examined by multiple regression analysis. The moderating effects of depression and family support on the association between aggression involvement and self-esteem were examined. The results showed that in females, aggression victims had lower self-esteem than those in the other three groups (t=−2.940 to 2.173, p0.05. In males, self-esteem in victims and perpetrator-victims was lower than in neutrals and perpetrators (t=−3.339 to −2.704, p0.05 or between perpetrators and neutrals (t=−1.396, p>0.05. Family support had a moderating effect on the association between self-esteem and victimization in males. Depression had a moderating effect on the association between self-esteem and perpetration-victimization and victimization in males. The results indicate that self-esteem in adolescents with different patterns of involvement in aggression is not the same as in those without involvement. The moderating effects of depression and family support should be considered when developing intervention strategies to raise self-esteem in adolescents with aggression involvement.

  13. Self-esteem in adolescent aggression perpetrators, victims and perpetrator-victims, and the moderating effects of depression and family support.

    Science.gov (United States)

    Wang, Peng-Wei; Yang, Pin-Chen; Yeh, Yi-Chun; Lin, Huang-Chi; Ko, Chih-Hung; Liu, Tai-Ling; Yen, Cheng-Fang

    2013-04-01

    The aims of this study were (1) to examine differences in the level of self-esteem among adolescents with different roles in aggression involvement (aggression perpetrators, victims, perpetrator-victims and neutrals) according to gender and (2) to examine the moderating effects of depression and family support on association between aggression involvement and self-esteem. A total of 8085 adolescents in Taiwan completed questionnaires. The relationships between self-esteem and aggression involvement were examined by multiple regression analysis. The moderating effects of depression and family support on the association between aggression involvement and self-esteem were examined. The results showed that in females, aggression victims had lower self-esteem than those in the other three groups (t=-2.940 to 2.173, p0.05). In males, self-esteem in victims and perpetrator-victims was lower than in neutrals and perpetrators (t=-3.339 to -2.704, p0.05) or between perpetrators and neutrals (t=-1.396, p>0.05). Family support had a moderating effect on the association between self-esteem and victimization in males. Depression had a moderating effect on the association between self-esteem and perpetration-victimization and victimization in males. The results indicate that self-esteem in adolescents with different patterns of involvement in aggression is not the same as in those without involvement. The moderating effects of depression and family support should be considered when developing intervention strategies to raise self-esteem in adolescents with aggression involvement. Copyright © 2012. Published by Elsevier B.V.

  14. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  15. Identifying victims of violence using register-based data

    DEFF Research Database (Denmark)

    Kruse, Marie; Sørensen, Jan; Brønnum-Hansen, Henrik

    2010-01-01

    AIMS: The aim of this study was twofold. Firstly we identified victims of violence in national registers and discussed strengths and weaknesses of this approach. Secondly we assessed the magnitude of violence and the characteristics of the victims using register-based data. METHODS: We used three...... nationwide registers to identify victims of violence: The National Patient Register, the Victim Statistics, and the Causes of Death Register. We merged these data and assessed the degree of overlap between data sources. We identified a reference population by selecting all individuals in Denmark over 15....... RESULTS: In 2006, 22,000 individuals were registered as having been exposed to violence. About 70% of these victims were men. Most victims were identified from emergency room contacts and police records, and few from the Causes of Death Register. There was some overlap between the two large data sources...

  16. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  17. The impact of perceived childhood victimization and patriarchal gender ideology on intimate partner violence (IPV) victimization among Korean immigrant women in the USA.

    Science.gov (United States)

    Kim, Chunrye

    2017-08-01

    Childhood victimization experiences are common among intimate partner violence (IPV) victims. This study examines the link between childhood physical and sexual victimization experiences and adulthood IPV among Korean immigrant women in the USA. As Korean immigrants often use physical punishment to discipline their children, and reporting sexual abuse is discouraged due to stigmatization in this community, cultural factors (e.g. patriarchal values) related to childhood victimization and IPV were also examined. Survey data from Korean immigrant women in the USA were collected. Using a case-control design, we compared 64 Korean immigrant women who have experienced IPV in the past year with 63 Korean immigrant women who have never experienced IPV in their lifetime. The findings of this study reveal that IPV victims, compared with non-victims, experienced higher childhood victimization rates. Logistic regression analysis demonstrated that childhood victimization and patriarchal gender ideology strongly predict IPV victimization among Korean immigrants. However, patriarchal values did not moderate the relationship between childhood victimization and IPV. To prevent IPV among Korean immigrant population, we need to make special efforts to prevent childhood abuse and change ingrained cultural attitudes about child physical and sexual abuse among immigrant communities through culturally sensitive programs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Victimisation and poverty: About victims and victimised in Serbia

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2014-01-01

    Full Text Available This paper is a theoretical analysis of the scientific and public discourse of victimization on the example of Serbia. The analysis has two objectives: to review the justification for the use of the concept of victim defined in the traditional way - within the legal framework; and in relation to this, to offer a different view on victimization. The process of becoming a victim is recognized as a social construct, created as a result of negotiations between the (non- formal social structure: institutions, the media, and the audience - those who stand aside, criminals and victims. In the process, some of the victims are assigned a status of justified, while others are sacrificed. There are rearely true parallels between them. Thus, unlike justified, whose suffering is perceived by public and political structures as a cause for the introduction of penal populism, the sacrificed rarely encounter any empathy. Even when they are victimized by conventional crime, the victims do not have the power to mobilize the public in a loud protest and call for change in legal practice. In the final score, it seems that the role victims are assigned largely depend of their social scale position.

  19. Interparental Conflict, Parenting Behavior, and Children's Friendship Quality as Correlates of Peer Aggression and Peer Victimization Among Aggressor/Victim Subgroups in South Korea.

    Science.gov (United States)

    Shin, Jung-Hee; Hong, Jun Sung; Yoon, Jina; Espelage, Dorothy L

    2014-07-01

    The focus of this study was to examine whether interparental conflict, maternal parenting behaviors, and children's friendship quality varied as a function of peer aggression/victim subgroups among a sample of 227 elementary school children and their mothers in South Korea. Both self-report and peer-report data indicated that the majority of the students were uninvolved in peer aggression situations, and the number of participants in the subgroups (aggressors, victims, and aggressor-victims) varied depending on the source of report. According to the self-report data, victims and aggressor-victims reported a higher level of maternal rejection than uninvolved youth. Aggressors, victims, and aggressor-victims reported higher maternal neglect than uninvolved youth. The highest level of interparental conflict was reported by victims, followed by aggressors. Interestingly, no significant differences were found in positive functioning of friendship quality among the subgroups, although results indicated a significant difference among groups in negative friendship quality. © The Author(s) 2013.

  20. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  1. Victimization experiences of adolescents in Malaysia.

    Science.gov (United States)

    Choo, Wan-Yuen; Dunne, Michael P; Marret, Mary J; Fleming, Marylou; Wong, Yut-Lin

    2011-12-01

    There has been little community-based research regarding multiple-type victimization experiences of young people in Asia, and none in Malaysia. This study aimed to estimate prevalence, explore gender differences, as well as describe typical perpetrators and family and social risk factors among Malaysian adolescents. A cross-sectional survey of 1,870 students was conducted in 20 randomly selected secondary schools in Selangor state (mean age: 16 years; 58.8% female). The questionnaire included items on individual, family, and social background and different types of victimization experiences in childhood. Emotional and physical types of victimization were most common. A significant proportion of adolescents (22.1%) were exposed to more than one type, with 3% reporting all four types. Compared with females, males reported more physical, emotional, and sexual victimization. The excess of sexual victimization among boys was due to higher exposure to noncontact events, whereas prevalence of forced intercourse was equal for both genders (3.0%). Although adult male perpetrators predominate, female adults and peers of both genders also contribute substantially. Low quality of parent-child relationships and poor school and neighborhood environments had the strongest associations with victimization. Family structure (parental divorce, presence of step-parent or single parent, or household size), parental drug use, and rural/urban location were not influential in this sample. This study extends the analysis of multiple-type victimization to a Malaysian population. Although some personal, familial, and social factors correlate with those found in western nations, there are cross-cultural differences, especially with regard to the nature of sexual violence based on gender and the influence of family structure. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  2. Adolescent Violent Victimization and Precocious Union Formation.

    Science.gov (United States)

    C Kuhl, Danielle; Warner, David F; Wilczak, Andrew

    2012-11-01

    This article bridges scholarship in criminology and family sociology by extending arguments about "precocious exits" from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization ("street" violence) on the timing of first co-residential union formation-differentiating between marriage and cohabitation-in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance.

  3. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  4. Secrecy and persistent problems in sexual assault victims.

    NARCIS (Netherlands)

    Ensink, B.J.; Winkel, F.W.; Berlo, van W.

    2001-01-01

    A substantial number of victims of sexual assault refrain from disclosing to others the victimizing episode and its emotional consequences. A prospective study (n = 36 rape victims reporting theirvictimization to the police) and a retrospective study (n = 33) were conducted to examine the

  5. Do targets of workplace bullying portray a general victim personality profile?

    Science.gov (United States)

    Glasø, Lars; Matthiesen, Stig Berge; Nielsen, Morten Birkeland; Einarsen, Ståle

    2007-08-01

    The aim of this study is to examine differences in personality between a group of bullied victims and a non-bullied group. The 144 participants, comprising of 72 victims and a matched contrast group of 72 respondents, completed Goldberg's (1999) International Personality Item Pool (IPIP). Significant differences emerged between victims and non-victims on four out of five personality dimensions. Victims tended to be more neurotic and less agreeable, conscientious and extravert than non-victims. However, a cluster analysis revealed that the victim sample can be divided into two personality groups. One cluster, which comprised 64% of the victim sample, do not differ from non-victims as far as personality is concerned. Hence, the results indicate that there is no such thing as a general victim personality profile. However, a small cluster of victims tended to be less extrovert, less agreeable, less conscientious, and less open to experience but more emotional unstable than victims in the major cluster and the control group. Further, both clusters of victims scored higher than non-victims on emotional instability, indicating that personality should not be neglected as being a factor in understanding the bullying phenomenon.

  6. Behavioral and Mental Health Correlates of Youth Stalking Victimization

    Science.gov (United States)

    Reidy, Dennis E.; Smith-Darden, Joanne P.; Kernsmith, Poco D.

    2018-01-01

    Introduction Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. Methods A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Results Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. Conclusions These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. PMID:27743623

  7. Peer victimization and peer rejection during early childhood

    Science.gov (United States)

    Godleski, Stephanie A.; Kamper, Kimberly E.; Ostrov, Jamie M.; Hart, Emily J.; Blakely-McClure, Sarah J.

    2014-01-01

    Objective The development and course of the subtypes of peer victimization is a relatively understudied topic despite the association of victimization with important developmental and clinical outcomes. Moreover, understanding potential predictors, such as peer rejection and emotion regulation, in early childhood may be especially important to elucidate possible bi-directional pathways between relational and physical victimization and rejection. The current study (N = 97) was designed to explore several gaps and limitations in the peer victimization and peer rejection literature. In particular, the prospective associations between relational and physical victimization and peer rejection over the course of 3.5 months during early childhood (i.e., 3- to 5- years-old) were investigated in an integrated model. Method The study consisted of 97 (42 girls) preschool children recruited from four early childhood schools in the northeast of the US. Using observations, research assistant report and teacher report, relational and physical aggression, relational and physical victimization, peer rejection, and emotion regulation were measured in a short-term longitudinal study. Path analyses were conducted to test the overall hypothesized model. Results Peer rejection was found to predict increases in relational victimization. In addition, emotion regulation was found to predict decreases in peer rejection and physical victimization. Conclusions Implications for research and practice are discussed, including teaching coping strategies for peer rejection and emotional distress. PMID:25133659

  8. Debate of victims studies. 1. ed.

    International Nuclear Information System (INIS)

    Kosovski, E.; Piedade Junior, H.; Mayr, E.

    1990-01-01

    This book shows some aspects and the effects of several types of accidents in the victims, including the psychological considerations, changes in theirs behaviour, concepts, clinical diagnostic, etc. Victims of nuclear, transit terrorism and work accidents are studied. (C.G.C.)

  9. Toward establishing basic rights of victims in Japan

    Directory of Open Access Journals (Sweden)

    Morosawa Hidemichi

    2008-01-01

    Full Text Available The author talks about improving victim rights in Japan and his important role in it. A period of Victims’ Renaissance in Japan began in the 1990s when the Japanese Association of Victimology and Mito Victim Assistance Cener, first non-governmental community-based integrated victim support center in Japan were established. Since May 1999 to May 2004, four laws such as “Crime Victim Protection Law”, “Child Abuse Prevention Law”, “Law for Proscribing Stalking Behavior” and so on were enacted and six laws were reformed. The word “rights of victim”, did not appear in any laws. After 2000, the National Association of Crime Victims and Surviving Families (NAVS played an important role. This Association achieved a great success in securing victims a position as the subject of rights. In June 2007, Japan changed the Criminal Procedure Law. This new law will be effective on six months after the day of promulgation. Japanese Government will promulgate it till the end of 2007. Under this new law, crime victims will be allowed to take part in criminal trials, and also make statements during trials.

  10. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  11. Sexual violence against children: authors, victims and consequences.

    Science.gov (United States)

    Platt, Vanessa Borges; Back, Isabela de Carlos; Hauschild, Daniela Barbieri; Guedert, Jucélia Maria

    2018-04-01

    The scope of this study was to identify the characteristics of sexual abuse against children including the profiles of the victims and the perpetrators, and associated factors notified in a health service of reference with the database of the Brazilian Case Registry Database, in a city in the south of Brazil. Categorical variables are presented in prevalence with 95% confidence intervals. There were 489 notifications from 2008 to 2014 of confirmed or suspected child sexual abuse. The majority was related to female victims, but the repeated abuse was reported mainly with male victims. In most cases, the abuse took place at the victims' or perpetrators' homes and the main perpetrators of abuse were male and acquainted with the victims. Twelve victims have contracted sexually transmitted infections; pregnancies were six, five of them legally terminated. This study highlights that the child sexual abuse profiles were similar in almost all of Brazilian regions, showing that it is possible to have a coordinated national action to prevent this offence.

  12. Alcohol Involvement in Homicide Victimization in the U.S

    Science.gov (United States)

    Naimi, Timothy S.; Xuan, Ziming; Cooper, Susanna E.; Coleman, Sharon M.; Hadland, Scott E.; Swahn, Monica H.; Heeren, Timothy C.

    2016-01-01

    Background Although the association between alcohol and homicide is well documented, there has been no recent study of alcohol involvement in homicide victimization in U.S. states. The objective of this paper was to determine the prevalence of alcohol involvement in homicide victimization and identify socio-demographic and other factors associated with alcohol involvement in homicide victimization. Methods Data from homicide victims with a reported blood alcohol content (BAC) level were analyzed from 17 states from 2010–12 using the National Violent Death Reporting System. Logistic regression was used to investigate factors associated with the odds of homicide victims having a BAC ≥0.08%. Results Among all homicide victims, 39.9% had a positive BAC including 13.7% with a BAC between 0.01%–0.79% and 26.2% of victims with a BAC ≥0.08%. Males were twice as likely as females to have a BAC ≥0.08% (29.1% vs. 15.2%; p homicide victims having a BAC ≥0.08 included male sex, American Indian/Alaska Native race, Hispanic ethnicity, history of intimate partner violence, and non-firearm homicides. Conclusions Alcohol is present in a substantial proportion of homicide victims in the U.S., with substantial variation by state, demographic and circumstantial characteristics. Future studies should explore the relationships between state-level alcohol policies and alcohol-involvement among perpetrators and victims of homicide. PMID:27676334

  13. Fatal Eurasian Brown Bear Attacks-Two Swedish Fatalities in Modern Times.

    Science.gov (United States)

    Gustafsson, Torfinn; Eriksson, Anders

    2015-11-01

    Fatal bear attacks on humans are uncommon with only one reported case in Sweden since 1902. The bear population is, however, growing and the frequency of confrontations is likely to increase. Case I-A 40-year-old hunter and his dog were found dead near a bear's den. Autopsy showed that a large portion of the face, facial skeleton, and anterior portion of the brain was missing. Autopsy of the bear showed two nonfatal gunshot wounds. Case II-A 61-year-old man and his dog were found dead outside a hunting lodge. Autopsy revealed numerous wounds, including partial evisceration of the intestines. The victim's blood ethanol concentration was 0.27%. These cases confirm the presence of risk factors identified by the Scandinavian Brown Bear Research Project, that is, provocation by a dog, encountering an injured bear, and appearing close to its den. An additional possible factor in case II was ethanol intoxication. © 2015 American Academy of Forensic Sciences.

  14. Emergency Care of the Snakebite Victim.

    Science.gov (United States)

    Ballard, Carol N.

    1994-01-01

    Describes emergency care of snakebite victims, including noting signs and symptoms of venomous snakebites, keeping the victim calm, and seeking immediate medical attention. Provides information on variables that affect the amount of injected venom and how to distinguish nonpoisonous from poisonous snakes. (LP)

  15. Trafficking in persons : A victim's perspective

    NARCIS (Netherlands)

    Rijken, Conny; Rijken, Conny; Piotrowicz, Ryszard; Uhl, Baerbel Heide

    2017-01-01

    Historically, protection and assistance to victims of human trafficking in many countries is anchored in migration law and dependent on whether or not a residence permit is granted to the victim. Apart from some limited exceptions, cooperation with law enforcement authorities in criminal

  16. Victimization by Siblings in Children with Disability or Weight Problems.

    Science.gov (United States)

    Tucker, Corinna J; Finkelhor, David; Turner, Heather

    Children with a physical disability, psychological disorder, or of nonnormative weight are often targets of peer victimization. Sibling victimization, however, is more common than peer victimization, but rarely explored. We investigated linkages between sibling victimization and whether children had a physical disability, psychological disorder (i.e., internalizing disorder, attention deficit disorder/attention-deficit hyperactivity disorder), and were perceived by parents as being thinner than average or overweight. Also, we explored how the extent and kinds of sibling victimization experiences were related to these characteristics in childhood. A US probability sample of adult caregivers of a child aged 0 to 9 (N = 780; 50% women; mean age 4.58) in 2-child households who completed a telephone interview. Controlling for other forms of maltreatment and individual and family characteristics, children with a physical disability and parent-perceived children who are thinner than average and children who are overweight experienced more sibling victimization. Children with an internalizing disorder experienced less sibling victimization. Sibling victimization did not differ for children with and without ADHD. Children perceived to be overweight by parents and children with a physical disability were at increased risk of experiencing more types of sibling victimization. Children with a physical disability had greater odds of being victims of property victimization by a sibling. Children with a physical disability or perceived as different from average weight are at risk for sibling victimization. Using a nationally representative sample, this is the first study to highlight the importance of screening for sibling victimization in families of children with a disability and/or nonnormative weight status.

  17. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  18. Adolescent Violent Victimization and Precocious Union Formation*

    Science.gov (United States)

    C. Kuhl, Danielle; Warner, David F.; Wilczak, Andrew

    2013-01-01

    This article bridges scholarship in criminology and family sociology by extending arguments about “precocious exits” from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization (“street” violence) on the timing of first co-residential union formation—differentiating between marriage and cohabitation—in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance. PMID:24431471

  19. Rumination mediates the association between cyber-victimization and depressive symptoms.

    Science.gov (United States)

    Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne

    2014-06-01

    The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.

  20. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents: A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    Eijnden, R.J.J.M. van den; Vermulst, A.A.; Rooij, A.J. van; Scholte, R.H.J.; Mheen, H. van de

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  1. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents : A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    van den Eijnden, Regina; Vermulst, Ad; van Rooij, Antonius J.; Scholte, Ron; van de Mheen, Dike

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  2. How to become a victim of crime

    OpenAIRE

    Богдан Миколайович Головкін

    2017-01-01

    Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1) the emergence of criminal threats; 2) increasing the degree of social vulnerability to criminal assault; 3) the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations); 4) increase the number of victims of crimes as regis...

  3. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  4. The Effects of Victim Age, Perceiver Gender, and Parental Status on Perceptions of Victim Culpability When Girls or Women Are Sexually Abused.

    Science.gov (United States)

    Klettke, Bianca; Mellor, David

    2018-05-01

    This study investigated perceptions of victim culpability in sexual assaults against girls and women according to victim age, perceiver gender, and perceiver parental status. Overall, 420 jury-eligible participants completed an online survey recording their attributions of guilt, responsibility, and blame toward 10-, 15-, and 20-year-old girls and women in relation to sexual assault. Attributions of culpability were affected by whether the victim physically or verbally resisted the abuse, wore sexually revealing clothes, or was described as having acted promiscuously. Fifteen-year-old victims were perceived as more culpable for the abuse than 10-year-old victims. Implications of these findings are discussed.

  5. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  6. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  7. The Association Between Familial Homelessness, Aggression, and Victimization Among Children.

    Science.gov (United States)

    Jetelina, Katelyn K; Reingle Gonzalez, Jennifer M; Cuccaro, Paula M; Peskin, Melissa F; Elliott, Marc N; Coker, Tumaini R; Mrug, Sylvie; Davies, Susan L; Schuster, Mark A

    2016-12-01

    The purpose of this study was to evaluate the relationship between the number of periods children were exposed to familial homelessness and childhood aggression and victimization. Survey data were obtained from 4,297 fifth-grade children and their caregivers in three U.S. cities. Children and primary caregivers were surveyed longitudinally in 7th and 10th grades. Family homelessness, measured at each wave as unstable housing, was self-reported by the caregiver. Children were categorized into four mutually exclusive groups: victim only, aggressor only, victim-aggressor, and neither victim nor aggressor at each time point using validated measures. Multinomial, multilevel mixed models were used to evaluate the relationship among periods of homelessness and longitudinal victimization, aggression, and victim aggression compared to children who were nonvictims and nonaggressors. Results suggest that children who experienced family homelessness were more likely than domiciled children to report aggression and victim aggression but not victimization only. Multivariate analyses suggested that even brief periods of homelessness were positively associated with aggression and victim aggression (relative to neither) compared to children who were never homeless. Furthermore, childhood victimization and victim aggression significantly decreased from 5th grade to 10th grade while aggression significantly increased in 10th grade. Children who experienced family homelessness for brief periods of time were significantly more likely to be a victim-aggressor or aggressor compared to those who were never homeless. Prevention efforts should target housing security and other important factors that may reduce children's likelihood of aggression and associated victimization. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  8. Commentary (Victim Participation in the International Criminal Court)

    DEFF Research Database (Denmark)

    Marchuk, Iryna

    2014-01-01

    Victim participation is one of the most innovative aspects introduced in the legal framework of the International Criminal Court (hereinafter – ICC), which has not featured in the practices of other international criminal courts and tribunals. The approach of the ad hoc tribunals to victims...... was very ‘consumer like’ because victims were solely used as witnesses to testify about the crimes attributed to the accused, but they were not granted broad participatory rights in the proceedings. The drafters of the Rome Statute acknowledged wide-ranging interests of victims who, apart from seeking...

  9. Quality of life of victims, bullies, and bully/victims among school-aged children in the Netherlands

    NARCIS (Netherlands)

    Klein Velderman, M.; Dorst, A.G. van; Wiefferink, C.H.; Detmar, S.B.; Paulussen, T.G.W.M.

    2008-01-01

    Two studies were conducted to examine the Quality of Life (QoL) of victims, bullies and bully/victims among Dutch school-aged children. Study 1 studied associations of QoL dimensions with self-reported victimisation in the Dutch sample from the KIDSCREEN Project (N = 1,669). Study 2 examined QoL of

  10. Modeling the mental health effects of victimization among homeless persons

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F.; Pollio, David

    2014-01-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults. PMID:18703266

  11. Modeling the mental health effects of victimization among homeless persons.

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F; Pollio, David

    2008-11-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults.

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Between "Victims" and "Criminals"

    DEFF Research Database (Denmark)

    Plambech, Sine

    2014-01-01

    This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...... trafficking”; others were categorized as undocumented migrants—“criminals” guilty of violating immigration laws. Despite the growing political attention devoted to protecting victims of trafficking, I argue that in areas of Nigeria prone to economic insecurity and gender-based violence, the categories...

  14. The reciprocal relationship between sexual victimization and sexual assertiveness.

    Science.gov (United States)

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  15. Pharyngitis - viral

    Science.gov (United States)

    ... throat is due to a viral infection. The antibiotics will not help. Using them to treat viral infections helps bacteria become resistant to antibiotics. With some sore throats (such as those caused ...

  16. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  17. There are no "innocent victims": the influence of just world beliefs and prior victimization on rape myth acceptance.

    Science.gov (United States)

    Vonderhaar, Rebecca L; Carmody, Dianne Cyr

    2015-06-01

    Utilizing data from an online survey of 979 university students, this study explores the relationship between prior sexual assault victimization experiences, belief in a just world, and acceptance of rape myths. Results indicated that men, younger respondents, and those with less education were more likely to support rape myths. Support for just world beliefs and rape myths were also positively associated, while rape victims exhibited less support for rape myths than non-victims. Implications for future studies are discussed. © The Author(s) 2014.

  18. Devenir victime des pesticides:Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel, Jean-Noël; Prete, Giovanni

    2014-01-01

    Cet article analyse les effets du recours au droit sur la mobilisation des travailleurs agricoles victimes des pesticides. Il repose sur une enquête qualitative auprès des membres de l’association Phyto-victimes, qui réunit ces agriculteurs, ainsi que de leurs proches et des professionnels du droit avec lesquels ils interagissent. À partir de ce matériau, nous retraçons les parcours suivis par les agriculteurs pour obtenir une reconnaissance de leur statut de victimes des pesticides. Nous ren...

  19. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  20. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  3. Childhood victimization experiences of young adults in St. Petersburg, Russia.

    Science.gov (United States)

    Bogolyubova, Olga; Skochilov, Roman; Smykalo, Lyubov

    2015-04-01

    The purpose of this study was to assess the prevalence of childhood victimization experiences in a sample of young adults in St. Petersburg, Russia. The study sample included 743 students aged 19 to 25 from 15 universities in St. Petersburg, Russia. All of the study participants completed a reliable questionnaire assessing the following types of childhood victimization: conventional crime, child maltreatment, peer victimization, sexual victimization, and witnessing violence. Participation in the study was anonymous. High rates of victimization and exposure to violence were reported by the study participants. The majority of the sample experienced at least one type of victimization during childhood or adolescence, and poly-victimization was reported frequently. The most common type of victimization reported was peer or sibling assault (66.94%), followed by witnessing an assault without weapon (63.91%), personal theft (56.19%), vandalism (56.06%), and emotional bullying (49.99%). Sexual assault by a known adult was reported by 1.45% males and 5.16% of females. This study provides new information on the scope of childhood victimization experiences in Russia. Further research is warranted, including epidemiological research with representative data across the country and studies of the impact of trauma and victimization on mental health and well-being of Russian adults and children. © The Author(s) 2014.

  4. Symbolic Victimization and Real World Fear.

    Science.gov (United States)

    Morgan, Michael

    1983-01-01

    Examines the relationship between victimization of characters in television drama and susceptibility to the viewers' cultivation of a sense of personal risk in the real world. Found that viewers whose fictional counterparts are more likely to be shown as victims show stronger associations between viewing and perceived vulnerability. (PD)

  5. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet

  6. Family as a factor of risk prevention and victim behaviour

    Directory of Open Access Journals (Sweden)

    Artur A. Rean

    2015-03-01

    Full Text Available The paper examines psychological factors victim behaviour. The definition of victim behaviour is given and it is emphasized that such conduct is not necessarily passivebehaviour of the victim. Victimization and behaviour can be active and aggressive. It is shown that antisocial, deviant behaviour of children and adolescents seriously increases the risk of victimization. Family as the most important institution of socialization is considered both as a preventing factor and risk factor of victim behaviour. The role of the family in shaping the victim behaviour is revealed in the following issues: aggressive, conflict behaviour is personal inclination or absence of the “proper” skills; interdependence of the severity of punishment and child aggression; punishment for child aggression (between siblings: what is the result?; ignoring aggression – is it the best solution?; victims of sexual violence and causes of victim behaviour; demonstrative accentuation as a risk factor in rape victim behaviour; happy family – can it be a risk factor for victim behaviour? For a long time, social deviant personality development has been believed to deal with structural deformation of the family, which is defined as a single-parent family, i.e. absence of one parent (usually the father. It is now proved that the major factor of family negative impact on personal development is not structural but psychosocial family deformation. A really happy family, psychologically happy family is the cornerstone of preventing victim behaviour. The victim behaviour being mainly determined by personal qualities does not negate this conclusion, but only strengthens it, as the qualities mentioned above are shaped in many respects within family socialization, are determined by family upbringing styles and features of interpersonal relationships inside the family.

  7. Sexual victimization and family violence among urban African American adolescent women: do violence cluster profiles predict partner violence victimization and sex trade exposure?

    Science.gov (United States)

    Kennedy, Angie C; Bybee, Deborah; Kulkarni, Shanti J; Archer, Gretchen

    2012-11-01

    Guided by an intersectional feminist perspective, we examined sexual victimization, witnessing intimate partner violence (IPV) in the family, and familial physical abuse among a sample of 180 urban African American adolescent women. We used cluster analysis to better understand the profiles of cumulative victimization, and the relationships between profiles and IPV victimization and personal exposure to the sex trade. Just under one third of the sample reported sexual victimization, with cooccurrence with both forms of family violence common. The cluster profile with high levels of severe family violence was associated with the highest rate of IPV victimization and sex trade exposure.

  8. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  9. Observer reactions to emotional victims of serious crimes : Stereotypes and expectancy violations

    NARCIS (Netherlands)

    Bosma, Alice; Mulder, Eva; Pemberton, Antony; Vingerhoets, Ad

    2018-01-01

    Negative observer reactions towards victims may be related to people’s expectations of the characteristics and demeanor of an ideal victim. We examined how expressed emotion, victim sex, and type of victimization influence observers’ perceptions of victim credibility, victim character, and harm. Our

  10. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  11. Viral Meningitis

    Science.gov (United States)

    ... better from treatment such as an antiviral medicine. Antibiotics do not help viral infections, so they are not useful in the treatment of viral meningitis. However, antibiotics do fight bacteria, so they are very important ...

  12. Devenir victime des pesticides : Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel , Jean-Noël; Prete , Giovanni

    2014-01-01

    International audience; A partir du cas de l’association Phyto-victimes, qui regroupe des agriculteurs souffrant de maladies chroniques qu’ils imputent aux pesticides, l’article met en évidence les effets ambigus du droit sur les mobilisations de victimes. L’article met en évidence les mécanismes par lesquels le droit amène des exploitants agricoles exposés à des pesticides et tombés malades à prendre conscience de leur statut de victimes, du préjudice qu’ils ont subi et des responsabilités e...

  13. Victims of educator-targeted bullying: a qualitative study

    Directory of Open Access Journals (Sweden)

    Corene de Wet

    2010-01-01

    Full Text Available I report on findings emanating from in-depth personal interviews with victims of educator-targeted bullying (ETB. Qualitative content analysis was used to analyse the narratives. The findings indicate that the victims of ETB were exposed repeatedly over time to verbal, non-verbal, psychological, and physical abuse during and after school hours. ETB had a negative influence on the victims' private lives, as well as on teaching and on learning. Lastly, I found that ETB may lead to a breakdown of relations between victims and the bullies' parents and the members of the community in which schools are situated.

  14. Temperamental Differences in Children’s Reactions to Peer Victimization

    Science.gov (United States)

    Sugimura, Niwako; Rudolph, Karen D.

    2015-01-01

    Objective This research examined the hypothesis that temperament and sex moderate the contribution of peer victimization to children’s subsequent adjustment (aggression and depressive symptoms). Method Children (125 boys, 158 girls; M age = 7.95 years, SD = 0.32; 77.7% White, 22.3% minority) and teachers reported on overt and relational victimization. Parents rated children’s temperament (inhibitory control and negative emotionality) and depressive symptoms, and teachers reported on children’s overt and relational aggression. Results Across a one-year time period, (a) overt victimization predicted overt aggression in girls with poor inhibitory control; (b) overt and relational victimization predicted depressive symptoms in girls with high negative emotionality; and (c) relational victimization predicted depressive symptoms in boys with low negative emotionality. Conclusions This research helps to explain individual variation in children’s reactions to peer victimization, and has implications for person-by-environment models of development. Moreover, this research informs the development of targeted intervention programs for victimized youth that bolster specific resources depending on their temperament. PMID:22420650

  15. Workplace Victimization and Discrimination in China: A Nationwide Survey.

    Science.gov (United States)

    Zhang, Huiping

    2017-09-01

    Workplace victimization and discrimination have been intensively studied in the West, especially on the antecedents and consequences of this phenomenon. Surprisingly, little is known about the incidence and associated health problems of workplace victimization and discrimination in contemporary China. Using a representative nationwide sample of 1,138 Chinese employees conducted in 2015, this study attempted to estimate the prevalence, risk factors, and associated consequences of workplace victimization and discrimination in China. It is found that the prevalence rate of preceding 5-year workplace discrimination and victimization was 33% and 12.9%, respectively. Male employees who perceived higher work gains were less likely to experience workplace victimization and those who had higher career efficacy and unemployment anxiety were more likely to experience job discrimination or victimization. Female employees who received tertiary education were less likely to experience job discrimination and being married tended not to experience workplace victimization. Perceived job discrimination had negative impact on male employees' job satisfaction as well as on female employees' happiness. The implications of these findings are finally discussed in the Chinese context.

  16. Cyberstalking victimization

    Directory of Open Access Journals (Sweden)

    Vilić Vida

    2013-01-01

    Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

  17. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  18. Bullying and victimization in elementary schools : A comparison of bullies, victims, bully/victims, and uninvolved preadolescents

    NARCIS (Netherlands)

    Veenstra, René; Lindenberg, Siegwart; Oldehinkel, Albertine J.; Winter, Andrea F. de; Verhulst, Frank C.; Ormel, Johan

    Research on bullying and victimization largely rests on univariate analyses and on reports from a single informant. Researchers may thus know too little about the simultaneous effects of various independent and dependent variables, and their research may be biased by shared method variance. The

  19. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  20. Network Exposure and Homicide Victimization in an African American Community

    Science.gov (United States)

    Wildeman, Christopher

    2014-01-01

    Objectives. We estimated the association of an individual’s exposure to homicide in a social network and the risk of individual homicide victimization across a high-crime African American community. Methods. Combining 5 years of homicide and police records, we analyzed a network of 3718 high-risk individuals that was created by instances of co-offending. We used logistic regression to model the odds of being a gunshot homicide victim by individual characteristics, network position, and indirect exposure to homicide. Results. Forty-one percent of all gun homicides occurred within a network component containing less than 4% of the neighborhood’s population. Network-level indicators reduced the association between individual risk factors and homicide victimization and improved the overall prediction of individual victimization. Network exposure to homicide was strongly associated with victimization: the closer one is to a homicide victim, the greater the risk of victimization. Regression models show that exposure diminished with social distance: each social tie removed from a homicide victim decreased one’s odds of being a homicide victim by 57%. Conclusions. Risk of homicide in urban areas is even more highly concentrated than previously thought. We found that most of the risk of gun violence was concentrated in networks of identifiable individuals. Understanding these networks may improve prediction of individual homicide victimization within disadvantaged communities. PMID:24228655

  1. The Victim-Offender Overlap and Fear of In-School Victimization: A Longitudinal Examination of Risk Assessment Models

    Science.gov (United States)

    Melde, Chris; Esbensen, Finn-Aage

    2009-01-01

    Reports of serious violence in schools have raised general awareness and concern about safety in America's schools. In this article, the authors examine the extent to which in-school victimization is associated with students' perceived risk and fear of victimization. By expanding on Ferraro's risk assessment framework, the current study explores…

  2. GENDER-BASED RESTORATIVE JUSTICE FOR VICTIMS OF VIOELENCE AGAINST WOMEN

    Directory of Open Access Journals (Sweden)

    Cahya Wulandari

    2015-01-01

    Full Text Available Positive law is less oriented towards the protection of victims, especially women. Restorative justice appears to protect and resolve problems with the interests of the victim-oriented. This article discuss the form of legal protection for victims of violence against women, gender-based and describe the form of restorative justice for victims of gender-based violence against women. Positive criminal law does not accommodate both the interests of the victim to determine the crime against him self and to restore his suffering. This is caused due to the dominance of retributive justice in the settlement mind set crime through the criminal law. The restorative justice allows for an active role in the completion of a crime victim who happens also allows the imposition of sanctions that are beneficial to the recovery of the suffering of the victims.

  3. Workplace mobbing: How the victim's coping behavior influences bystander responses.

    Science.gov (United States)

    Mulder, Roelie; Bos, Arjan E R; Pouwelse, Mieneke; van Dam, Karen

    2017-01-01

    Victims of workplace mobbing show diverse coping behavior. We investigated the impact of this behavior on bystander cognitions, emotions, and helping toward the victim, integrating coping literature with attribution theory. Adult part-time university students (N = 161) working at various organizations participated in a study with a 3(Coping: approach/avoidance/neutral) × 2(Gender Victim: male/female) × 2(Gender Bystander: male/female) design. Victims showing approach (vs. avoidance) coping were considered to be more self-reliant and less responsible for the continuation of the mobbing, and they elicited less anger. Continuation responsibility and self-reliance mediated the relationship between the victim's coping behavior and bystanders' helping intentions. Female (vs. male) participants reported more sympathy for the victim and greater willingness to help, and female (vs. male) victims elicited less anger. Theoretical and practical implications of the findings are discussed.

  4. Simulations of centriole of polarized centrosome as a monopole antenna in immune and viral synapses.

    Science.gov (United States)

    Dvorak, Josef; Melichar, Bohuslav; Filipova, Alzbeta; Grimova, Jana; Grimova, Nela; Rozsypalova, Aneta; Buka, David; Voboril, Rene; Zapletal, Radek; Buchler, Tomas; Richter, Igor; Buka, David

    2018-01-01

    The immune synapse (IS) is a temporary interface between an antigen-presenting cell and an effector lymphocyte. Viral synapse is a molecularly organized cellular junction that is structurally similar to the IS. Primary cilium is considered as a functional homologue of the IS due to the morphological and functional similarities in architecture between both micotubule structures. It has been hypothesized that endogenous electromagnetic field in the cell is generated by a unique cooperating system between mitochondria and microtubules. We are extending this prior hypothesis of the endogenous electromagnetic field in the cell postulating that polarized centriole in immune and viral synapse could serve as a monopole antenna. This is an addition to our hypothesis that primary cilium could serve as a monopole antenna. We simulated the distribution of electric field of centriole of polarized centrosome as a monopole antenna in immune and viral synapse. Very weak electromagnetic field of polarized centriole of CD8+ T lymphocyte in IS can contribute to the transport of cytolytic granules into the attacked (cancer) cell. Analogically, very weak electromagnetic field of polarized centriole in viral synapse of infected CD4 cells can aid the transport of viruses (human immunodeficiency virus) to non-infected CD4 cells. We hypothesized that healthy organisms need these monopole antennas. If, during the neoplastic transformation, healthy cells lose monopole antennas in form of primary cilia, the IS aims to replace them by monopole antennas of polarized centrioles in IS to restore homeostasis.

  5. Predictors of Latent Trajectory Classes of Dating Violence Victimization

    Science.gov (United States)

    Brooks-Russell, Ashley; Foshee, Vangie; Ennett, Susan

    2014-01-01

    This study identified classes of developmental trajectories of physical dating violence victimization from grades 8 to 12 and examined theoretically-based risk factors that distinguished among trajectory classes. Data were from a multi-wave longitudinal study spanning 8th through 12th grade (n = 2,566; 51.9% female). Growth mixture models were used to identify trajectory classes of physical dating violence victimization separately for girls and boys. Logistic and multinomial logistic regressions were used to identify situational and target vulnerability factors associated with the trajectory classes. For girls, three trajectory classes were identified: a low/non-involved class; a moderate class where victimization increased slightly until the 10th grade and then decreased through the 12th grade; and a high class where victimization started at a higher level in the 8th grade, increased substantially until the 10th grade, and then decreased until the 12th grade. For males, two classes were identified: a low/non-involved class, and a victimized class where victimization increased slightly until the 9th grade, decreased until the 11th grade, and then increased again through the 12th grade. In bivariate analyses, almost all of the situational and target vulnerability risk factors distinguished the victimization classes from the non-involved classes. However, when all risk factors and control variables were in the model, alcohol use (a situational vulnerability) was the only factor that distinguished membership in the moderate trajectory class from the non-involved class for girls; anxiety and being victimized by peers (target vulnerability factors) were the factors that distinguished the high from the non-involved classes for the girls; and victimization by peers was the only factor distinguishing the victimized from the non-involved class for boys. These findings contribute to our understanding of the heterogeneity in physical dating violence victimization during

  6. Male Rape Victim and Perpetrator Blaming

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2010-01-01

    One of four possible vignettes manipulated by (a) level of rape myth contained within them (low vs. high) and (b) type of rape (stranger vs. acquaintance) was presented to participants followed by scales measuring victim blame, perpetrator blame, belief in a just world, sex-role egalitarian beliefs, and male rape myth acceptance. Victim blaming…

  7. Protective Factors for Psychotic Symptoms Among Poly-victimized Children.

    Science.gov (United States)

    Crush, Eloise; Arseneault, Louise; Jaffee, Sara R; Danese, Andrea; Fisher, Helen L

    2018-04-06

    Experiencing victimization in early life has been repeatedly shown to be associated with the emergence of psychotic symptoms in childhood. However, most victimized children do not develop psychotic symptoms and why this occurs is not fully understood. This study investigated which individual, family-level, and wider community characteristics were associated with an absence of psychotic symptoms among children at risk for psychosis by virtue of their exposure to multiple victimization experiences (poly-victimization). Participants were from the Environmental Risk Longitudinal Twin Study, a nationally representative cohort of 2232 UK-born twins. Exposure to maltreatment, bullying and domestic violence prior to age 12 was determined from interviews with mothers, children, and observations by research workers at ages 5, 7, 10, and 12. Children were interviewed about psychotic symptoms at age 12. Protective factors were measured at ages 5, 7, 10, and 12. Childhood poly-victimization was associated with age-12 psychotic symptoms (OR = 4.61, 95% CI 2.82-7.52), but the majority of poly-victimized children did not report symptoms (80.7%). Having a relatively high IQ, more positive atmosphere at home, and higher levels of neighborhood social cohesion were found to be protective against childhood psychotic symptoms among poly-victimized children and also in the whole sample. However, "protected" poly-victimized children displayed elevated levels of other mental health problems compared to nonvictimized children. Children's characteristics, family context, and the wider community were all found to protect children from developing early psychotic symptoms, even when they were victimized multiple times. These findings indicate targets for multilevel preventive interventions.

  8. Internet piracy and consequences for victims

    Directory of Open Access Journals (Sweden)

    Savić Miljan

    2016-01-01

    Full Text Available After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total social cost of piracy. However, there are other categories of victims, such as those whose honor was besmirched as a result of piracy, and who suffer the consequences in the form of negative emotional reactions, loss of job as well as those who subsequently commit suicide. The object of this paper is to describe the effects of internet piracy on the victims of this phenomenon, and the goal is the analysis of the various direct and indirect effects of piracy on victims and their motivation for future creation, as well as analysis of prevention measures, with special emphasis on the Republic of Serbia.

  9. Race, Ethnicity, and Adolescent Violent Victimization.

    Science.gov (United States)

    Tillyer, Marie Skubak; Tillyer, Rob

    2016-07-01

    The risk of adolescent violent victimization in the United States varies considerably across racial and ethnic populations; it is unknown whether the sources of risk also vary by race and ethnicity. This study examined the correlates of violent victimization for White, Black, and Hispanic youth. Data collected from 11,070 adolescents (51 % female, mean age = 15.04 years) during the first two waves of the National Longitudinal Study of Adolescent to Adult Health were used to estimate group-specific multilevel logistic regression models. The results indicate that male, violent offending, peer deviance, gang membership, and low self-control were significantly associated with increased odds of violent victimization for all groups. Some activities-including getting drunk, sneaking out, and unstructured socializing with peers-were risk factors for Black adolescents only; skipping school was a risk factor only for Hispanic adolescents. Although there are many similarities across groups, the findings suggest that minority adolescents are particularly vulnerable to violent victimization when they engage in some activities and minor forms of delinquency.

  10. The impact of criminal justice involvement on victims' mental health.

    Science.gov (United States)

    Parsons, Jim; Bergin, Tiffany

    2010-04-01

    The aftermath of violent crime can leave victims with persistent emotional and mental health problems. Although research has shown the potential benefits of prosecuting cases through the courts, there is also a substantial literature that suggests that common features of the criminal justice system can exacerbate the impact of the initial crime, leading to a secondary victimization. The authors present a review of the research on the positive and negative impact of criminal justice involvement, and common points of failure in the efforts of justice institutions to meet the needs of victims. They conclude with recommendations for future work, including the need for research on restorative justice, victim impact statements, court notification systems, victim services, and victim advocates.

  11. Violent online games exposure and cyberbullying/victimization among adolescents.

    Science.gov (United States)

    Lam, Lawrence T; Cheng, Zaohuo; Liu, Xinmin

    2013-03-01

    This population-based cross-sectional survey examined the association between exposure to violent online games and cyberbullying and victimization in adolescents recruited from two large cities utilizing a stratified two-stage random cluster sampling technique. Cyberbullying and victimization were assessed by the E-victimization and E-bullying scales validated in a previous study. Exposure to violent online games was measured by self-nomination of the degree of violent content in the games played. Results indicated that the majority (74.3 percent) of respondents did not experience any cyberbullying or victimization in the last 7 days before the survey, 14.4 percent reported to be victimized via cyberspace, 2.9 percent admitted that they had bullied others, and 8.4 percent reported to be both perpetrators- and- victims. One hundred and eighty seven (15.3 percent) considered games they were playing were of moderate to severe violence. Students who had been involved in cyberbullying as well as being victimized were two times as likely to have been exposed to violent online games, and nearly four times as likely for those involved in bullying others. Exposure to violent online games was associated with being a perpetrator as well as a perpetrator-and-victim of cyberbullying. Parents and clinicians need to be aware of the potential harm of these exposures. The policy implications of results were also discussed.

  12. The relevance of the social context for media coverage of victims

    Directory of Open Access Journals (Sweden)

    Pavićević Olivera

    2017-01-01

    Full Text Available Media coverage of human suffering caused by trauma, illness, poverty and disasters worldwide takes up a significant part of media coverage and affects the identity of all actors, both active and passive. Media presentation shapes our thinking and reasoning at the group level, and has far reached impact. The social context of media reporting on victims is shaped by the capacity of the social system to recognize, acknowledge, strengthen and protect the victim. As an aspect of this capacity, media coverage of victims is indicator of victimization visibility. This paper discusses nature of media reporting as a phenomenon appearing in various forms as per given sources of victimization, and the ethical aspects of media presentation of victims. The aim of the paper is to contribute to the critical analysis of the media coverage of victims, by reconsidering an increased visibility of victims and their suffering, which is generated by media reporting, and whose dominant characteristic is presenting victims in the interpretative and performing manner.

  13. Professionals' conduct as a condition for minimizing secondary victimization of the victims of spouse abuse

    Directory of Open Access Journals (Sweden)

    Ignjatović Tanja

    2009-01-01

    Full Text Available Through analysis of the 'administrative' aspects of experts' documentation kept by three services in one local community - the police station, the center for social welfare and the primary health care center, the possibility of reducing victimization of victims of partnership violence within the family is the subject of consideration. The results of the analysis point to the necessity of rationalization and standardization of recording and procedures by the professionals.

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  15. Cyber Victimization in High School: Measurement, Overlap with Face-to-Face Victimization, and Associations with Social-Emotional Outcomes

    Science.gov (United States)

    Brown, Christina Flynn; Demaray, Michelle Kilpatrick; Tennant, Jaclyn E.; Jenkins, Lyndsay N.

    2017-01-01

    Cyber victimization is a contemporary problem facing youth and adolescents (Diamanduros, Downs, & Jenkins, 2008; Kowalski & Limber, 2007). It is imperative for researchers and school personnel to understand the associations between cyber victimization and student social-emotional outcomes. This article explores (a) gender differences in…

  16. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  17. Victimizations of Mexican youth (12-17 years old): A 2014 national survey.

    Science.gov (United States)

    Frías, Sonia M; Finkelhor, David

    2017-05-01

    Victimization of Mexican youth (aged 12-17) has received little attention compared to that of adults. Using the 2014 Social Survey on Social Cohesion for the Prevention of Violence and Delinquency, we examine prevalence and types of victimization; describe the characteristics of incidents in terms of relationship with perpetrator(s) and places where took place; and study significant correlates of forms of victimization and poly-victimization. During 2014 alone, more than 2.8 million minors were victims of bullying, cyberbullying, theft, sexual abuse, physical assault, threats, robbery, or extortion. About 10% of these were poly-victims-experienced at least four different types of victimization by at least four types of perpetrators. Youth tended to be victimized by people in their inner circle. The factors associated with victimization tended to vary by victimization type, but proximity to crime and peer delinquency increased the risk of experiencing all types of victimization. Implications for future research and practice are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. The Second Victim Experience and Support Tool: Validation of an Organizational Resource for Assessing Second Victim Effects and the Quality of Support Resources.

    Science.gov (United States)

    Burlison, Jonathan D; Scott, Susan D; Browne, Emily K; Thompson, Sierra G; Hoffman, James M

    2017-06-01

    Medical errors and unanticipated negative patient outcomes can damage the well-being of health care providers. These affected individuals, referred to as "second victims," can experience various psychological and physical symptoms. Support resources provided by health care organizations to prevent and reduce second victim-related harm are often inadequate. In this study, we present the development and psychometric evaluation of the Second Victim Experience and Support Tool (SVEST), a survey instrument that can assist health care organizations to implement and track the performance of second victim support resources. The SVEST (29 items representing 7 dimensions and 2 outcome variables) was completed by 303 health care providers involved in direct patient care. The survey collected responses on second victim-related psychological and physical symptoms and the quality of support resources. Desirability of possible support resources was also measured. The SVEST was assessed for content validity, internal consistency, and construct validity with confirmatory factor analysis. Confirmatory factor analysis results suggested good model fit for the survey. Cronbach α reliability scores for the survey dimensions ranged from 0.61 to 0.89. The most desired second victim support option was "A respected peer to discuss the details of what happened." The SVEST can be used by health care organizations to evaluate second victim experiences of their staff and the quality of existing support resources. It can also provide health care organization leaders with information on second victim-related support resources most preferred by their staff. The SVEST can be administered before and after implementing new second victim resources to measure perceptions of effectiveness.

  19. ASD and PTSD in Rape Victims

    Science.gov (United States)

    Elklit, Ask; Christiansen, Dorte M.

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims shortly after the rape or attempted rape. The PTSD…

  20. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  1. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  2. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  3. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  4. Weight perceptions, misperceptions, and dating violence victimization among U.S. adolescents.

    Science.gov (United States)

    Farhat, Tilda; Haynie, Denise; Summersett-Ringgold, Faith; Brooks-Russell, Ashley; Iannotti, Ronald J

    2015-05-01

    Dating violence is a major public health issue among youth. Overweight/obese adolescents experience peer victimization and discrimination and may be at increased risk of dating violence victimization. Furthermore, given the stigma associated with overweight/obesity, perceptions and misperceptions of overweight may be more important than actual weight status for dating violence victimization. This study examines the association of three weight indices (weight status, perceived weight, and weight perception accuracy) with psychological and physical dating violence victimization. The 2010 baseline survey of the 7-year NEXT Generation Health Study used a three-stage stratified clustered sampling design to select a nationally representative sample of U.S. 10th-grade students (n = 1,983). Participants who have had a boyfriend/girlfriend reported dating violence victimization and perceived weight. Weight status was computed from measured height/weight. Weight perception accuracy (accurate/underestimate/overestimate) was calculated by comparing weight status and perceived weight. Gender-stratified regressions examined the association of weight indices and dating violence victimization. Racial/ethnic differences were also examined. The association of weight indices with dating violence victimization significantly differed by gender. Overall, among boys, no associations were observed. Among girls, weight status was not associated with dating violence victimization, nor with number of dating violence victimization acts; however, perceived weight and weight perception accuracy were significantly associated with dating violence victimization, type of victimization, and number of victimization acts. Post hoc analyses revealed significant racial/ethnic differences. White girls who perceive themselves (accurately or not) to be overweight, and Hispanic girls who are overweight, may be at increased risk of dating violence victimization. These findings suggest a targeted approach to

  5. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  6. The Voiceless Victim: A critical analysis of the impact of enhanced victim participation in the criminal justice process

    Directory of Open Access Journals (Sweden)

    Sarah Moynihan

    2015-12-01

    Full Text Available In contrast to many European jurisdictions, the victim of an alleged crime in England, Wales and Northern Ireland is denied any form of meaningful participation at the trial stage of the criminal justice process. This is by reason of the unyielding structure of the Anglo-American adversarial system, which facilitates a dispute between two parties only - the prosecution, acting on behalf of the collective public interest and the defence. In recent years, however, the victims’ movement has gained momentum as advocates of victims’ rights have been engaged in an impassioned campaign to enhance the participatory rights of victims in the criminal justice process. Fervent arguments have been articulated pertaining to the value of various forms of victim input. This paper cogitates some of these arguments and critically evaluates how enhanced victim participation in the criminal justice process has the potential to undercut the integrity of the Anglo- American adversarial system; a system with objective adjudication at its core.

  7. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  8. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  9. Emotional Profile of Women Victims of Domestic Violence.

    Science.gov (United States)

    Avdibegovic, Esmina; Brkic, Maja; Sinanovic, Osman

    2017-06-01

    Research indicates that women victims of domestic violence show significant cognitive changes, emotional numbing, and avoidance of interpersonal relationships. The aim of this research was to analyze emotional profile of women victims of domestic violence, and to determine the relationship between dimensions of emotions and frequency of women exposure to domestic violence. The research was conducted on the sample of 169 women, 111 were victims of domestic violence and 58 were women who did not experience domestic violence. Plutchik's Emotions Profile Index (EPI) was used for measuring of the emotion profile, and the Modified Inventory of Domestic Violence for measuring experiences of different types of violence. Basic socio-demographic data were also collected. Significant differences between women victims of domestic violence and women who did not experience domestic violence were found in a few dimensions of emotional profile. Women victims of domestic violence had higher results in the dimensions of deprivation/depression and aggression/destruction, while women who did not experience domestic violence had higher results in dimensions of reproduction and incorporation. Aggression was in significant negative correlation with reproduction, incorporation and self protection, whereas it was significant positive correlation with deprivation and opposition. There were significant and positive correlation between the dimensions of aggression and deprivation and frequency of all three forms of domestic violence and age of women. According to results obtained in this research, it can be concluded that women victims of domestic violence have significantly more intensive negative emotional dimensions in comparison to women who were not abused. Women victims of domestic violence with higher frequency of abuse describe themselves as more sad, apathetic, lonely, angry, quarrelsome and less sociable. Prominence of negative emotions, deprivation and aggression, can be factor of

  10. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  11. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  12. [A sociography of elderly victims of family violence in Portugal].

    Science.gov (United States)

    Gil, Ana Paula; Santos, Ana João; Kislaya, Irina; Santos, César; Mascoli, Luísa; Ferreira, Alexandra Inácio; Vieira, Duarte Nuno

    2015-06-01

    This article presents data on violence against persons aged 60 years or older and living in Portugal for at least 12 months. The cross-sectional descriptive study collected data with a face-to-face questionnaire applied to victims that had sought assistance at three government institutions and one non-governmental support service for victims. The non-probabilistic sample included 510 victims of violence in family settings. Physical and psychological violence were the most common (87.8% and 69.6%, respectively). Financial violence was reported by 47.5% of the victims, followed by sexual assault (7.5%) and neglect (6.5%). The majority of victims (74.1%) reported more than one type of violence. Victims were mostly women, and mean age was 70.7 years. Most of the perpetrators belonged to the nuclear family, namely spouses or partners, sons/sons-in-law, and daughters/daughters-in-law. However, differences were observed according to victim's gender. The results indicate that violence is not a uniform phenomenon, presenting different configurations.

  13. The incongruity of workplace bullying victimization and inclusive excellence.

    Science.gov (United States)

    Dzurec, Laura Cox; Kennison, Monica; Gillen, Patricia

    Bullying occurs frequently-and with significant negative outcomes-in workplace settings. Once established, bullying endures in the workplace, requiring the interaction of a bully perpetrator and an intended target who takes on the role of victim. Not every target becomes a victim, however. The purpose of this study is to investigate the processes by which targets, intended objects of bullies' affronts, become victims, those individuals who experience ongoing emotional injury in response to bullies' affronts, and to clarify how bullying victimization impedes inclusive excellence in the workplace. The design for this study was pragmatic utility, an inductive research approach grounded in assumptions of hermeneutics. The pragmatic utility process involved the investigators' synthesis of descriptions from a broad, interdisciplinary published literature. Integrating knowledge from their previous research and practice experiences with the pragmatic utility process, they derived qualitative features of victims' experiences, differentiating target from victim in bullying encounters. For those targets who ultimately are victimized, response to bullies' affronts extends far beyond the immediate present. Redolence of personal, lived experience revives bygone vulnerabilities, and naïve communication and relationship expectations reinforce a long-standing, impoverished sense. That sense couples with workplace dynamics to augment a context of exclusion. Findings suggest that, as Heidegger contended, we are our histories. Personal history demonstrates a significance influence on the manifestation of bullying victimization, acting to distance them from their workplace peers and to impede inclusive excellence. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Extracorporeal Detoxification in Victims with Severe Concomitant Injury

    Directory of Open Access Journals (Sweden)

    S. Ye. Khoroshilov

    2009-01-01

    Full Text Available Objective: to improve the results of victims with massive crushes of soft tissues in severe concomitant injury (SCI, by applying extracorporeal detoxification techniques as soon as possible. Subjects and methods. The results of examination and treatment were studied in 41 victims with SCI treated at the N. N. Burdenko Main Military Clinical Hospital in 2006 to 2008. In the early posttraumatic period (on days 1—3, all the victims (n=41 were divided into 2 groups. Group 1 victims (n=19 underwent hemodiafiltration (HDF with replacement at 35 ml/kg/hr; Group 2 (n=22 had plasmapheresis. Results. Early HDF applied to Group 1 victims could achieve 32, 44, and 37% reductions in the elevated levels creatine phosphokinase, myoglobin, and middle-sized molecules, respectively. In Group 2, plasmapheresis showed a lower effect (19, 25, and 26% reductions. Furthermore, there was a decrease in total protein in Group 1, which was absent in Group 2. Conclusion. The timely use of extracorporeal detoxification techniques in victims with massive crushes of soft tissues in the early posttraumatic period prevents the development of fatal complications of SCI, at the same time HDF is more effective and safe than plasmapheresis. Key words: severe concomitant injury, rhabdomyolysis, myoglobin, plasmapheresis, hemodiafiltration.

  15. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  16. Hepatitis viral aguda

    Directory of Open Access Journals (Sweden)

    Héctor Rubén Hernández Garcés

    1998-10-01

    Full Text Available Se realizó una revisión bibliográfica de las hepatitis virales agudas sobre aspectos vinculados a su etiología. Se tuvieron en cuenta además algunos datos epidemiológicos, las formas clínicas más importantes, los exámenes complementarios con especial énfasis en los marcadores virales y el diagnóstico positivoA bibliographical review of acute viral hepatitis was made taking into account those aspects connected with its etiology. Some epidemiological markers, the most important clinical forms, and the complementary examinations with special emphasis on the viral markers and the positive diagnosis were also considered

  17. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  18. Virale commercials: de consument als marketeer. Onderzoek naar de redenen waarom consumenten virale commercials doorsturen: hun motieven, de inhoudskenmerken van viral commercials en de mediumcontext waarin virale commercials verschijnen

    NARCIS (Netherlands)

    Ketelaar, P.E.; Lucassen, P.; Kregting, G.H.J.

    2010-01-01

    Research into the reasons why consumers pass along viral commercials: their motives, the content characteristics of viral commercials and the medium context in which viral commercials appear. Based on the uses and gratifications perspective this study has determined which motives of consumers,

  19. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  20. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  1. Do Social Relationships Protect Victimized Children against Internalizing Problems?

    Science.gov (United States)

    Averdijk, Margit; Eisner, Manuel; Ribeaud, Denis

    2014-01-01

    We investigated whether social relationships protect children against the effects of victimization on internalizing problems. We used data from the Zurich Project on the Social Development of Children and Youths. Victimization at age 8 years was associated with internalizing problems at age 9 years. Victims who had siblings, warm parents, and a…

  2. Disability in Relation to Different Peer-Victimization Groups and Psychosomatic Problems

    Science.gov (United States)

    Beckman, Linda; Stenbeck, Magnus; Hagquist, Curt

    2016-01-01

    The purpose of this study was to examine the associations between disability, victims, perpetrators, and so-called "bully-victims" (someone reporting being both a victim and a perpetrator) of traditional, cyber, or combined victimization or perpetration and psychosomatic health among adolescents. Authors analyzed cross-sectional data…

  3. Global Human Trafficking and Child Victimization.

    Science.gov (United States)

    Greenbaum, Jordan; Bodrick, Nia

    2017-12-01

    Trafficking of children for labor and sexual exploitation violates basic human rights and constitutes a major global public health problem. Pediatricians and other health care professionals may encounter victims who present with infections, injuries, posttraumatic stress disorder, suicidality, or a variety of other physical or behavioral health conditions. Preventing child trafficking, recognizing victimization, and intervening appropriately require a public health approach that incorporates rigorous research on the risk factors, health impact, and effective treatment options for child exploitation as well as implementation and evaluation of primary prevention programs. Health care professionals need training to recognize possible signs of exploitation and to intervene appropriately. They need to adopt a multidisciplinary, outward-focused approach to service provision, working with nonmedical professionals in the community to assist victims. Pediatricians also need to advocate for legislation and policies that promote child rights and victim services as well as those that address the social determinants of health, which influence the vulnerability to human trafficking. This policy statement outlines major issues regarding public policy, medical education, research, and collaboration in the area of child labor and sex trafficking and provides recommendations for future work. Copyright © 2017 by the American Academy of Pediatrics.

  4. Viral Disease Networks?

    Science.gov (United States)

    Gulbahce, Natali; Yan, Han; Vidal, Marc; Barabasi, Albert-Laszlo

    2010-03-01

    Viral infections induce multiple perturbations that spread along the links of the biological networks of the host cells. Understanding the impact of these cascading perturbations requires an exhaustive knowledge of the cellular machinery as well as a systems biology approach that reveals how individual components of the cellular system function together. Here we describe an integrative method that provides a new approach to studying virus-human interactions and its correlations with diseases. Our method involves the combined utilization of protein - protein interactions, protein -- DNA interactions, metabolomics and gene - disease associations to build a ``viraldiseasome''. By solely using high-throughput data, we map well-known viral associated diseases and predict new candidate viral diseases. We use microarray data of virus-infected tissues and patient medical history data to further test the implications of the viral diseasome. We apply this method to Epstein-Barr virus and Human Papillomavirus and shed light into molecular development of viral diseases and disease pathways.

  5. Early risk factors for being a bully, victim, or bully/victim in late elementary and early secondary education. The longitudinal TRAILS study

    Directory of Open Access Journals (Sweden)

    Ormel Johan

    2011-06-01

    Full Text Available Abstract Background Data regarding the impact of early risk factors on later involvement in bullying are scarce. We investigated the impact of preschool behaviors, family characteristics (socio-economic status, family breakup and parental mental health on bullying and victimization at age 11 (T1 and age 13.5 (T2. Methods longitudinal data from a subsample of the TRacking Adolescents' Individual Lives Survey (TRAILS (T1: N = 982; T2: N = 977. TRAILS is a prospective study of adolescent mental health in a mixed urban and rural region of the Netherlands. At T1 parents reported on family characteristics, parental mental health and retrospectively on children's preschool behavior at age 4-5. Schoolmates reported involvement of adolescents in bullying or victimization at T1 and T2. Results Children with preschool anxiety were less likely to be bully/victim at T1. Children with preschool aggressiveness were more likely to be bully (T1, bully/victim (T1 and T2 and victim (T2 and children with good preschool motor functioning were more likely to be bully (T1 and less likely to be victim (T1 and T2. Children from low socioeconomic status families were more likely be to be bully, victim, or bully/victim and less likely to be uninvolved both at T1 and T2. Finally, children from intact two parent families were more likely to be uninvolved at T2. Conclusion Preschool behavioral, emotional and motor problems, socioeconomic status, and family breakup are related to involvement in bullying at a later age. Prevention of bullying and its consequences can be enhanced by focusing on risk groups in early life.

  6. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  7. Experience in working with volunteers as providers of support to victims and witnesses in victim and witness support departments at the courts

    Directory of Open Access Journals (Sweden)

    Hamer-Vidmar Nikica

    2015-01-01

    Full Text Available The aim of this paper is to present the results of a survey on the experience of engaging volunteers as providers of support for victims and witnesses in Victim and Witness Support Departments at the courts. The Independent Service for Victim and Witness Support in Ministry of Justice is responsible for the development of the victim and witness support system in Croatia. The Independent Service also coordinates the work of Victim and Witness Support Departments and develops and provides training programs and supervision for support officers and volunteers. A survey was conducted in order to determine volunteer motivation, assess the volunteers’ required qualities, their educational needs, the emotional impact arising from the work with victims and witnesses and the volunteers‘ assessment of the level of acceptance by court officials. In order to improve the level of safety of volunteers and the organization itself, the selection and educational processes for volunteers have been improved, according to both the experience achieved by working with volunteers and the results of the aforementioned survey. Engaging volunteers in the judicial system is a large step forward in the field of co-operation between the judiciary and the community.

  8. 78 FR 52877 - VOCA Victim Assistance Program

    Science.gov (United States)

    2013-08-27

    ... these requirements has merely been re-worked for clarity. Under the proposed rule SAAs must identify... victim populations will allow OVC and SAAs to better tailor their training and technical assistance and... SAAs may use for these purposes. Funding victim service programs located in adjacent States. Program...

  9. Relational Aggression and Victimization in College Students

    Science.gov (United States)

    Dahlen, Eric R.; Czar, Katherine A.; Prather, Emily; Dyess, Christy

    2013-01-01

    For this study we explored relational aggression and victimization in a college sample (N = 307), examining potential gender and race differences, correlates, and the link between relational aggression and common emotional and behavioral problems, independent of relational victimization. Gender and race differences were observed on relational…

  10. Coping and Sexual Harassment: How Victims Cope across Multiple Settings.

    Science.gov (United States)

    Scarduzio, Jennifer A; Sheff, Sarah E; Smith, Mathew

    2018-02-01

    The ways sexual harassment occurs both online and in face-to-face settings has become more complicated. Sexual harassment that occurs in cyberspace or online sexual harassment adds complexity to the experiences of victims, current research understandings, and the legal dimensions of this phenomenon. Social networking sites (SNS) are a type of social media that offer unique opportunities to users and sometimes the communication that occurs on SNS can cross the line from flirtation into online sexual harassment. Victims of sexual harassment employ communicative strategies such as coping to make sense of their experiences of sexual harassment. The current study qualitatively examined problem-focused, active emotion-focused, and passive emotion-focused coping strategies employed by sexual harassment victims across multiple settings. We conducted 26 in-depth interviews with victims that had experienced sexual harassment across multiple settings (e.g., face-to-face and SNS). The findings present 16 types of coping strategies-five problem-focused, five active emotion-focused, and six passive emotion-focused. The victims used an average of three types of coping strategies during their experiences. Theoretical implications extend research on passive emotion-focused coping strategies by discussing powerlessness and how victims blame other victims. Furthermore, theoretically the findings reveal that coping is a complex, cyclical process and that victims shift among types of coping strategies over the course of their experience. Practical implications are offered for victims and for SNS sites.

  11. Comparing victim attributions and outcomes for workplace aggression and sexual harassment.

    Science.gov (United States)

    Hershcovis, M Sandy; Barling, Julian

    2010-09-01

    In 2 studies, we investigated victim attributions (Study 1) and outcomes (Study 2) for workplace aggression and sexual harassment. Drawing on social categorization theory, we argue that victims of workplace aggression and sexual harassment may make different attributions about their mistreatment. In Study 1, we investigated victim attributions in an experimental study. We hypothesized that victims of sexual harassment are more likely than victims of workplace aggression to depersonalize their mistreatment and attribute blame to the perpetrator or the perpetrator's attitudes toward their gender. In contrast, victims of workplace aggression are more likely than victims of sexual harassment to personalize the mistreatment and make internal attributions. Results supported our hypotheses. On the basis of differential attributions for these 2 types of mistreatment, we argue that victims of workplace aggression may experience stronger adverse outcomes than victims of sexual harassment. In Study 2, we compared meta-analytically the attitudinal, behavioral, and health outcomes of workplace aggression and sexual harassment. Negative outcomes of workplace aggression were stronger in magnitude than those of sexual harassment for 6 of the 8 outcome variables. Implications and future directions are discussed. Copyright 2010 APA, all rights reserved

  12. The interrelation between victimization and bullying inside young offender institutions.

    Science.gov (United States)

    Häufle, Jenny; Wolter, Daniel

    2015-01-01

    Bullying and victimization are serious problems within prisons. Young Offender Institutions (YOIs), in particular, suffer from high rates of inmate-on-inmate violence. More recent theories about the development of bullying in closed custody institutions imply a relationship between the experience of victimization and the usage of bullying. In our study, we test this linkage using longitudinal survey data taken at two time-points from 473 inmates (aged 15-24) inside three YOIs in Germany. We first analyze the extent of bullying and victimization, and then used a longitudinal structural equation model to predict inmate bullying behavior at time 2 based on victimization that occurred at time 1. Age is used as a predictor variable to account for differences in the amount of victimization and bullying. Results suggest that bullying and victimization are high in the YOIs, which were subject to research. Most inmates reported being a bully and a victim at the same time. Younger inmates use more direct physical bullying but not psychological bullying. An increase in psychological bullying over time can significantly be explained by victimization at an earlier measurement time point. Our study therefore supports recent theoretical assumptions about the development of bullying behavior. Possible implications for prevention and intervention are discussed. © 2014 Wiley Periodicals, Inc.

  13. Implicit Social Cognitive Processes Underlying Victim Self and Identity: Evidence With College-Aged Adults.

    Science.gov (United States)

    Sachs, Nicole M; Veysey, Bonita M; Rivera, Luis M

    2017-11-01

    Past research on victimization has relied predominantly on individuals' awareness of and willingness to self-report a victimization experience and its effect on self and identity processes. The present research adopts theoretical and methodological innovations in implicit social cognition research to provide a new perspective on how a violent victimization experience might influence identity processes outside of conscious awareness. Our main goal was to test whether individuals who have victimization experience implicitly associate the self with victims (implicit victim identity) and their stereotypes (implicit victim self-stereotyping), and the relation of these associations to explicit victim identity and self-stereotyping. Two pretests with undergraduate student participants ( Ns = 122 and 72) identified victim-related word stimuli for two Single Category Implicit Association Test (SC-IAT) measures of implicit victim identity and self-stereotyping. In Pretest Study A, participants read crime vignettes and listed words that described a victim, then in Pretest Study B, participants rated these words on victim relatedness and valence. The Main Study recruited undergraduate student participants ( N = 101) who completed the SC-IATs, self-report measures of explicit victim identity and self-stereotyping, and victimization experiences. Three of our five hypotheses were supported. Individuals with past victimization experience exhibited strong explicit victim identity and self-stereotyping, but not implicit victim identity and self-stereotyping, relative to those with no victimization experience. Explicit and implicit victim identity and self-stereotyping were unrelated. Finally, among individuals with victimization experience, a strong implicit victim identity was associated with strong implicit victim self-stereotyping. This research has implications for understanding the processes underlying revictimization and for preventing further victimization.

  14. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    Directory of Open Access Journals (Sweden)

    Monika Mushevska

    2016-01-01

    Full Text Available The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of age, which are victims of different kinds of crime or witnesses of different kinds of crime, in spite of the role that they have in the crime act. In all proceedings that directly or indirectly child victims involved it is important to act in a way that is the best and most appropriate for the child.

  15. Effects of peer victimization on psychological and academic adjustment in early adolescence.

    Science.gov (United States)

    Rueger, Sandra Yu; Jenkins, Lyndsay N

    2014-03-01

    The purpose of the current study is to investigate the effects of frequency of peer victimization experiences on psychological and academic adjustment during early adolescence, with a focus on testing psychological adjustment as a mediator, as well as differences based on gender and type of victimization. The sample in this short-term longitudinal design study consists of 7th and 8th graders (n = 670, 50% male) from an ethnically and socioeconomically diverse middle school. Victimization was measured using 10 items that assessed frequency of verbal, physical, and relational victimization experiences, and outcomes were assessed with the Behavior Assessment System for Children (2nd ed.) and school records. There was support for gender differences in frequency of peer victimization experiences based on type of victimization. More specifically, boys reported higher levels of physical and verbal victimization, and girls reported higher levels of relational victimization. In addition, there were statistically significant differences between boys and girls on the relation between victimization and anxiety, attendance, and grades, with girls experiencing more maladjustment than boys in response to peer victimization. Finally, results demonstrated no gender differences in indirect effects of psychological adjustment on the relation between peer victimization and academic outcomes, whether victimization was physical, verbal, and relational. These findings highlight the importance of addressing social-emotional functioning as well as peer victimization in the schools for both boys and girls, as both affect students' academic functioning. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  16. Peer victimization: Intimidation and victmization in Chilean students

    Directory of Open Access Journals (Sweden)

    Verónica López

    2009-12-01

    Full Text Available This paper presents the results of a study about peer intimidation and victimization with 1167 school students from 6th, 7th, and 8th grade from the Valparaiso Region of Valparaíso, Chile. The instrument used was the Insebull Battery (Avilés & Elices, 2007. Results show that approximately 9% of students have been victim of peer victimization many times or almost every day during the school year. Psychological victimization was more frequent thanphysical aggression, particularly through virtual communication such as cell-phone messages and e-mails. Participants tend to be groups of male students. Although male students participate more in physical aggression, they also receive more physical and psychological aggression. The most frequent places were inside the classroom and the school yard, when the teacher is not present. Most students inform not knowing, or vaguely knowing, thereasons underlying these aggressions, and do not do anything to deal with them. These results coincide with international studies and allow a better understanding of the characteristics of peer victimization in specific educational contexts within the Chilean school system.

  17. Do Victimization Experiences Accentuate Reactions to Ostracism? An Experiment Using Cyberball

    Science.gov (United States)

    Ruggieri, Sabrina; Bendixen, Mons; Gabriel, Ute; Alsaker, Françoise

    2013-01-01

    Based on the notion that the history of victimization has an impact on the sensitivity to current victimization situations this study investigated whether victims of bullying show more pronounced responses to single episodes of social exclusion. We examined whether victimization experiences in school are associated with responses to ostracism in a…

  18. Victims of cybercrime in Europe : a review of victim surveys

    NARCIS (Netherlands)

    Reep-van den Bergh, Carin M.M.; Junger, Marianne

    2018-01-01

    Objectives: Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods: We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected

  19. Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization

    OpenAIRE

    Erdinc Ozturk; Gizem Akcan

    2016-01-01

    Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...

  20. Victims and Heroes

    DEFF Research Database (Denmark)

    Højbjerg, Christian K.

    2010-01-01

    Victimization, autochthony and citizenship, power and nation-building constitute recurrent, interrelated themes in post-war Manding historical memory in the border area between Liberia and Guinea. While the perceived history of the Manding diverges from academic, historical knowledge as well...

  1. Measuring adolescents’ exposure to victimization: The Environmental Risk (E-Risk) Longitudinal Twin Study

    Science.gov (United States)

    Fisher, Helen L.; Caspi, Avshalom; Moffitt, Terrie E.; Wertz, Jasmin; Gray, Rebecca; Newbury, Joanne; Ambler, Antony; Zavos, Helena; Danese, Andrea; Mill, Jonathan; Odgers, Candice L.; Pariante, Carmine; Wong, Chloe C.; Arseneault, Louise

    2016-01-01

    This paper presents mutlilevel findings on adolescents’ victimization exposure from a large longitudinal cohort of twins. Data were obtained from the Environmental Risk (E-Risk) Longitudinal Twin Study, an epidemiological study of 2,232 children (1,116 twin pairs) followed to 18 years of age (with 93% retention). To assess adolescent victimization we combined best practices in survey research on victimization with optimal approaches to measuring life stress and traumatic experiences, and introduce a reliable system for coding severe victimization. One in three children experienced at least one type of severe victimization during adolescence (crime victimization, peer/sibling victimization, internet/mobile phone victimization, sexual victimization, family violence, maltreatment, or neglect), and most types of victimization were more prevalent amongst children from low socioeconomic backgrounds. Exposure to multiple victimization types was common, as was re-victimization; over half of those physically maltreated in childhood were also exposed to severe physical violence in adolescence. Biometric twin analyses revealed that environmental factors had the greatest influence on most types of victimization, while severe physical maltreatment from caregivers during adolescence was predominantly influenced by heritable factors. The findings from this study showcase how distinct levels of victimization measurement can be harmonized in large-scale studies of health and development. PMID:26535933

  2. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  3. Nuclear tests: the late indemnification of victims; Essais nucleaire: l'indemnisation tardive des victimes

    Energy Technology Data Exchange (ETDEWEB)

    Charbonneau, S. [Bordeaux-1 Univ., 33 (France)

    2010-04-15

    The author briefly recalls the historical context of the creation of the CEA and outlines the silence and denial about the radioactive contamination of military personnel during the nuclear tests performed in the Algerian Sahara and in Polynesia. He also outlines the continuous action of the association of veterans and victims of these nuclear tests which gathered proofs of health consequences. He comments the content and scope of application of laws which have been lately adopted (in 2010) to acknowledge these facts and indemnify the victims

  4. Mobil Viral Pazarlama

    OpenAIRE

    Barutçu, Süleyman

    2011-01-01

    OBJECTIVE: Mobile Viral Marketing, with using mobile phones, is one of the most importantinnovations after Word of Mouth Marketing performed by face to face amongpeople and Viral Marketing performed in the İnternet. The main objective of thisstudy is to call marketing communicators’ and academicians’ attentions whowant to increase the recognition of companies’ products, services and brands tobecome a current issue in the marketplace using Mobile Viral Marketingapplications by reason of techno...

  5. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  6. Domestic violence and the impact on its victims

    OpenAIRE

    Kirejevová, Iva

    2010-01-01

    Domestic violence is one of the essential problems of our society. Domestic violence is determined by high prevalence, enormous latency and great victimization impact. The aim of my thesis is to describe the psychological aspects of the victims of domestic violence. I presume that long-term psychological and physical violence has a crucial influence on the psycho-somatic health of the victim. I am aware of the fact that this problem does not concern only battered women. Nevertheless I want to...

  7. The linkage between secondary victimization by law enforcement and rape case outcomes.

    Science.gov (United States)

    Patterson, Debra

    2011-01-01

    Prior research has suggested that almost half of rape victims are treated by law enforcement in ways that they experience as upsetting (termed secondary victimization). However, it remains unknown why some victims have negative experiences with law enforcement and others do not. The purpose of this study is to explore victims' experiences with secondary victimization by detectives, comparing how these experiences vary in cases that were ultimately prosecuted by the criminal justice system to those that were not prosecuted. A total of 20 rape victims are interviewed within one county. The study uses grounded theory qualitative analysis, which showed that participants whose cases were eventually prosecuted described the detectives' treatment toward them considerably different than participants with nonprosecuted cases. The study findings further show that victims with cases that were not prosecuted primarily described their detectives as engaging in secondary victimization behaviors and that victims with cases that were ultimately prosecuted primarily described their detectives as responding compassionately toward them.

  8. Obese and Overweight Youth: Risk for Experiencing Bullying Victimization and Internalizing Symptoms.

    Science.gov (United States)

    Waasdorp, Tracy Evian; Mehari, Krista; Bradshaw, Catherine P

    2018-01-22

    Obese and overweight youth are at an increased risk for poor peer relations and psychosocial adjustment. Of particular concern is the high rate of bullying victimization experienced by obese and overweight youth. While it is known that victimized youth are at an increased risk for internalizing symptoms, few studies have examined if weight status exacerbates the association between victimization and internalizing symptoms. The current study drew upon data from over 43,000 youth attending 107 middle and high schools. Multilevel results suggested that compared with normal weight youth, both overweight and obese youth were at an increased risk for experiencing relational, verbal, and cyber victimization, with only obese youth being at an increased risk for experiencing physical victimization. Notably, the odds for experiencing cyber victimization were higher than the odds for experiencing other forms of victimization. Frequently victimized obese youth, but not frequently victimized overweight youth, had significantly higher levels of internalizing symptoms compared to their frequently victimized, normal-weight peers. Together, these findings highlight the increased risk for psychosocial adjustment problems among frequently victimized overweight and obese youth, suggesting these youth may require preventive interventions tailored to meet their unique needs. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  9. [The profile of female victims of conjugal violence].

    Science.gov (United States)

    Vasseur, Philippe

    2004-12-18

    To define the profile of female victims of conjugal violence examined in the Legal Medicine emergency unit of the Hotel-Dieu hospital in Paris. A self-administered questionnaire with 15 questions was distributed to 100 victims. The 100 victims replied: 86 cases of violence took place usually in the home, 78 episodes of violence were multiple and complaints were rarely lodged after the first episodes. Mental and sexual violence were severe and unrecognized. Eighty women interviewed suffered from mental violence. In 43 cases, alcohol played a determining role in the onset of such violence. Female victims of conjugal violence do not have a specific profile. The law of silence persists, but the increase in the number of complaints from North African and African women is encouraging for the future.

  10. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  11. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  12. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  13. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  15. Understanding Image Virality

    Science.gov (United States)

    2015-06-07

    Example non-viral images. Figure 1: Top: Images with high viral scores in our dataset depict internet “celebrity” memes ex. “Grumpy Cat”; Bottom: Images...of images that is most similar to ours is the concurrently introduced viral meme generator of Wang et al., that combines NLP and Computer Vision (low...doing any of our tasks. The test included questions about widely spread Reddit memes and jargon so that anyone familiar with Reddit can easily get a high

  16. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  17. Familial Influences on Dating Violence Victimization Among Latino Youth.

    Science.gov (United States)

    Reyes, H Luz McNaughton; Foshee, Vangie A; Klevens, Joanne; Tharp, Andra Teten; Chapman, Mimi V; Chen, May S; Ennett, Susan T

    2016-01-01

    Despite theoretical and empirical evidence suggesting that the family environment plays a central role in Latino youth development, relatively little is known about how family processes influence dating violence victimization among Latino adolescents. To address this gap in the literature, we used data from 210 Latino parents and their 13- to 15-year-old adolescents to examine associations between several different family processes, including both parenting practices (parent monitoring, parent-adolescent communication) and aspects of the family relational climate (family cohesion, family conflict, acculturation conflict) and psychological, physical, and sexual dating violence victimization. Consistent with expectations, lower levels of family cohesion and higher levels of family and acculturation conflict were associated with risk for dating violence victimization, although associations varied depending on victimization type. In contrast, neither parental monitoring nor parent-adolescent communication was significantly associated with any type of dating violence victimization. In addition, we found that parent, but not teen, Anglo-American acculturation was associated with higher dating violence victimization risk. Findings suggest that family-based dating abuse prevention programs for Latino youth should seek to increase family cohesion and decrease family conflict, including acculturation-based conflict.

  18. The Victim Handling Model of Human Trafficking Through Economic Independence

    OpenAIRE

    Nuraeny, Henny; Utami, Tanti Kirana

    2016-01-01

    Human Trafficking is a modern trading of human slavery. Human Trafficking is also one of the worst forms of violation of human dignity that results in trauma to the victims. To that end, there should be a comprehensive treatment for victims. The problems that can be studied is whether a model that can be applied in the treatment of victims of trafficking in Cianjur and disseminating technical how models Handling of Victims of Human Trafficking in Cianjur. This study used normative juridical a...

  19. Short-term Lost Productivity per Victim: Intimate Partner Violence, Sexual Violence, or Stalking.

    Science.gov (United States)

    Peterson, Cora; Liu, Yang; Kresnow, Marcie-Jo; Florence, Curtis; Merrick, Melissa T; DeGue, Sarah; Lokey, Colby N

    2018-05-15

    The purpose of this study is to estimate victims' lifetime short-term lost productivity because of intimate partner violence, sexual violence, or stalking. U.S. nationally representative data from the 2012 National Intimate Partner and Sexual Violence Survey were used to estimate a regression-adjusted average per victim (female and male) and total population number of cumulative short-term lost work and school days (or lost productivity) because of victimizations over victims' lifetimes. Victims' lost productivity was valued using a U.S. daily production estimate. Analysis was conducted in 2017. Non-institutionalized adults with some lifetime exposure to intimate partner violence, sexual violence, or stalking (n=6,718 respondents; survey-weighted n=130,795,789) reported nearly 741 million lost productive days because of victimizations by an average of 2.5 perpetrators per victim. The adjusted per victim average was 4.9 (95% CI=3.9, 5.9) days, controlling for victim, perpetrator, and violence type factors. The estimated societal cost of this short-term lost productivity was $730 per victim, or $110 billion across the lifetimes of all victims (2016 USD). Factors associated with victims having a higher number of lost days included a higher number of perpetrators and being female, as well as sexual violence, physical violence, or stalking victimization by an intimate partner perpetrator, stalking victimization by an acquaintance perpetrator, and sexual violence or stalking victimization by a family member perpetrator. Short-term lost productivity represents a minimum economic valuation of the immediate negative effects of intimate partner violence, sexual violence, and stalking. Victims' lost productivity affects family members, colleagues, and employers. Published by Elsevier Inc.

  20. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    INTRODUCTION: From the clinical forensic examination reports produced by the Department of Forensic Medicine, Department of Forensic Medicine, Faculty of Health Sciences, University of Copenhagen, Denmark, in 2007 concerning rape, attempted rape and sexual assault (RAS), circumstances were...... extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  1. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  2. Children’s Attribution of Emotions in Victimization Situations: Examination of the Happy Victimizer Task and its Relation to Children’s Moral Behavior

    OpenAIRE

    Cabral Menéres, Maria Sofia

    2014-01-01

    Tese de Doutoramento em Psicologia, apresentada a Departament of Psychology, Faculty of Arts and Social Sciences, Simon Fraser University Children’s understanding of emotions in victimization situations has been investigated as a way to study children’s moral motivation. To assess this understanding, researchers have used a procedure known as the happy victimizer task in which children are asked to attribute emotions to victimizers who have performed an immoral action. In the present study...

  3. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  5. Victimization and its associations with peer rejection and fear of victimization: Moderating effects of individual-level and classroom-level characteristics

    Czech Academy of Sciences Publication Activity Database

    Kollerová, Lenka; Smolík, Filip

    2016-01-01

    Roč. 86, č. 4 (2016), s. 640-656 ISSN 0007-0998 R&D Projects: GA ČR(CZ) GA15-00682S Institutional support: RVO:68081740 Keywords : fear of victimization * peer rejection * victimization Subject RIV: AN - Psychology Impact factor: 2.403, year: 2016

  6. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  7. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  8. How older persons explain why they became victims of abuse

    DEFF Research Database (Denmark)

    Mysyuk, Yuliya; Westendorp, Rudi Gerardus Johannes; Lindenberg, Jolanda

    2016-01-01

    independently, in residential care facilities and nursing homes. SUBJECTS: six males and 11 females aged 63-90 years. RESULTS: the main causes of abuse identified by older victims themselves were mutual dependency between victim and perpetrator, power and control imbalances, loneliness and a marginalised social...... with the perpetrator. Coping strategies mentioned by victims were seeking informal or professional help and using self-help strategies. CONCLUSION: older victims perceive abuse differently depending on the expected acceptability of the type(s) of abuse experienced and the anticipated stigma associated...

  9. Invisible victims. Analysis of a case of abuse from the perspective of the victim with intellectual disability

    Directory of Open Access Journals (Sweden)

    Belén GUTIÉRREZ-BERMEJO

    2017-09-01

    Full Text Available This article aims to analyze the experience of abuse by a person with intellectual disability. For this purpose, a semi-structured interview was recorded, transcribed and analyzed according to the existing scientific literature. The results show the emotional impact of the abuse experience on the victim. It also identifies false myths in relation to the emotional experience of people with intellectual disabilities and provides psychological explanations for the actions of the different people involved in the aggressions. The plurality of abuse situations which the victim may face, as well as the permanence of abuse over the years, define a common characteristic in the maltreatment of individuals with intellectual disabilities. Understanding all the dynamics that can lead to abuse in people with intellectual disabilities provides a new perspective in the assessment and intervention with these victims.

  10. Bullying Victimization Type and Feeling Unsafe in Middle School.

    Science.gov (United States)

    Bowser, John; Larson, James D; Bellmore, Amy; Olson, Chelsea; Resnik, Felice

    2018-01-01

    Given their significance to school violence, this study quantifies the association between bullying victimization and perceptions of safety separately for victimization where the type is not specified versus victimization that is physical in nature. Generalized liner mixed modeling was employed with 5,138 sixth- to eighth-grade students in 24 schools who self-reported on their bullying victimization and perceptions of school safety on an anonymous survey in fall 2015. Results indicate a multiplicative interaction exists with regard to the odds of feeling unsafe at school among those who were bullied at all (odds ratio [ OR] = 3.1) compared to those who were bullied physically ( OR = 9.12). For school nurses who work with students with a variety of concerns and health issues, this research indicates that the use of bullying victimization as an outcome, proxy and/or predictor, requires inquiry into the type of bullying experienced to aid in the care and support received.

  11. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  12. Victim empathy, social self-esteem, and psychopathy in rapists.

    Science.gov (United States)

    Fernandez, Yolanda M; Marshall, W L

    2003-01-01

    The purpose of the present study was to compare the responses of 27 incarcerated rapists and 27 incarcerated nonsexual offenders using the Rapist Empathy Measure (targeting victim specific empathy deficits) and to examine the relationship between empathy with self-esteem and psychopathy for both groups. The Social Self-Esteem Inventory was used as a measure of perceived social competence and the Psychopathy Checklist-Revised (PCL-R; Hare, 1991) was used as a measure of psychopathy. All participants completed the two self-report questionnaires on empathy and self-esteem; in addition, the rapists were required to complete an extra section of the empathy measure that assessed their empathic responses to their own victims. Demographic information and psychopathy scores were obtained by reviewing institutional files. When psychopathy scores were not available, subjects participated in a semi-structured interview and were scored on the Psychopathy Checklist-Revised by the researcher. Rapists demonstrated more empathy than the nonsexual offenders toward women in general and the same degree of empathy as the nonsexual offenders toward a woman who had been a victim of a sexual assault by another male. Of particular importance were the within-group comparisons across victim type for the rapists which revealed significant empathy deficits toward their own victim(s). Interestingly, no differences were found between the rapists and nonsexual offenders in terms of self-esteem and psychopathy, and neither self-esteem nor psychopathy significantly predicted empathy for either group. It was concluded from the present study that rapists may suppress empathy primarily toward their own victim rather than suffer from a generalized empathy deficit. It is suggested that empathy deficits in rapists might better be construed as cognitive distortions specific to their victims and should be addressed in that manner in treatment.

  13. Physical examination of sexual assault victims in Belgrade area

    Directory of Open Access Journals (Sweden)

    Alempijević Đorđe

    2006-01-01

    Full Text Available Introduction: Sexual crimes represent various forms of contact of perpetrator’s genitals, lips, tongue, and fingers with genitals, lips and/or anus of the victim, in order to achieve sexual satisfaction, without victim’s consent. Objective: The aim of this work was to analyze the type of medical institution in which victims of sexual assaults are being examined in Belgrade area, to assess the quality of these examinations and medical records, as well as to control whether standardized protocols are followed. Method: Data were obtained through analysis of 113 cases of sexual assaults prosecuted in the District Court of Belgrade. Results: All victims were females with mean age of 24.1 years. The majority of victims (85% were examined in one medical institution, most often in the Institute of Gynecology and Obstetrics, Clinical Center of Serbia, and only by one medical doctor (81.4%. Gynecologists were most frequently included in examination, while specialists of forensic medicine were engaged in only 9 cases (7.9%. In 84% of victims, the examination was performed during the first three days after the assault, and in 52% of cases on the first day. Standard techniques of clinical and gynecological examinations were applied only, without following any protocols, so the reports were made exclusively on individual basis. In no case an informed consent by victim was obtained before examination. Anamnestic data were collected in only 15.9% of cases, and they were generally incomplete. Conclusion: The results of investigation show that the quality of examination of sexual assault victims in Belgrade area is not adequate. Therefore, such negative practice should be changed in future through introduction of standardized protocols for examination of victims, as well as development of clinical forensic medicine.

  14. Bully Victimization: Selection and Influence Within Adolescent Friendship Networks and Cliques.

    Science.gov (United States)

    Lodder, Gerine M A; Scholte, Ron H J; Cillessen, Antonius H N; Giletta, Matteo

    2016-01-01

    Adolescents tend to form friendships with similar peers and, in turn, their friends further influence adolescents' behaviors and attitudes. Emerging work has shown that these selection and influence processes also might extend to bully victimization. However, no prior work has examined selection and influence effects involved in bully victimization within cliques, despite theoretical account emphasizing the importance of cliques in this regard. This study examined selection and influence processes in adolescence regarding bully victimization both at the level of the entire friendship network and the level of cliques. We used a two-wave design (5-month interval). Participants were 543 adolescents (50.1% male, Mage = 15.8) in secondary education. Stochastic actor-based models indicated that at the level of the larger friendship network, adolescents tended to select friends with similar levels of bully victimization as they themselves. In addition, adolescent friends influenced each other in terms of bully victimization over time. Actor Parter Interdependence models showed that similarities in bully victimization between clique members were not due to selection of clique members. For boys, average clique bully victimization predicted individual bully victimization over time (influence), but not vice versa. No influence was found for girls, indicating that different mechanisms may underlie friend influence on bully victimization for girls and boys. The differences in results at the level of the larger friendship network versus the clique emphasize the importance of taking the type of friendship ties into account in research on selection and influence processes involved in bully victimization.

  15. Mediators and Moderators of the Association Between Stalking Victimization and Psychological Distress.

    Science.gov (United States)

    Fais, Connor R; Lutz-Zois, Catherine J; Goodnight, Jackson A

    2017-03-01

    The current study aims to understand mediators and moderators of the relationship between stalking victimization and depression. Based on the reformulated learned helplessness theory, which emphasizes the role of internal, global, and stable attributions for negative events in the development of depression, we predicted that the association between stalking victimization and depression would be mediated by attributions for the stalking and characterological self-blame. We predicted that the association between stalking victimization and helplessness attributions or characterological self-blame, in turn, would be moderated by gender, sex-role identity, and length of stalking. Specifically, we hypothesized that female victims, victims possessing a feminine sex-role identity, and victims experiencing longer stalking episodes would be more likely to experience depression in comparison with male victims, victims possessing a masculine sex-role identity, and victims experiencing shorter stalking episodes. The results indicated that global attributions for the cause of stalking significantly mediated the relationship between stalking victimization and depression. The results for stable attributions, internal attributions, and characterological self-blame were nonsignificant. Furthermore, gender, sex-role identity, and length of stalking did not moderate the association between stalking and attributional style or characterological self-blame. The implications of these findings and directions for future research are discussed.

  16. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  17. Elderly victims of gender violence in Portugal: Invisible and not heard?

    Science.gov (United States)

    Magalhães, Maria José; Rodríguez Castro, Yolanda; Ruido, Patricia Alonso; Braga Lopez, Rita DeOliveira

    2016-12-01

    In this article, we explore professionals' representations of elderly female victims of gender violence. Semi-structured interviews were used to explore seven professionals' work philosophies and intervention methodologies in their work with elderly female victims of violence, their main problems and difficulties, and their perspectives regarding shelters for elderly women. Results show that there are no specific philosophies and methodologies to intervene with these victims. There is a tendency to homogenize all the victims of gender violence, regardless of their age and specific needs. The professionals also tended to trivialize gender violence against elderly female victims, considering that these women tolerate violence.

  18. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  19. When the Cop Is the Victim: A Test of Target Congruence Theory on Intimate Partner Violence Victimization Experienced by Police Officers.

    Science.gov (United States)

    Zavala, Egbert

    2017-05-01

    This study analyzed data from the Police Stress and Domestic Violence in Police Families in Baltimore, Maryland, 1997-1999 ( N = 753) to examine propositions derived from target congruence theory in the context of intimate partner violence (IPV) victimization experienced by police officers. Specifically, this study tested the influence of target vulnerability, target gratifiability, and target antagonism on IPV victimization. Results from logistic regression models showed that all three theoretical constructs positively and significantly predicted IPV victimization. Results, as well as the study's limitations and directions for future research, are discussed.

  20. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  1. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems.

    Science.gov (United States)

    Park, Subin; Lee, Yeeun; Jang, Hyesue; Jo, Minkyung

    2017-05-19

    We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES), exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  2. Relations among School Connectedness, Hope, Life Satisfaction, and Bully Victimization

    Science.gov (United States)

    You, Sukkyung; Furlong, Michael J.; Felix, Erika; Sharkey, Jill D.; Tanigawa, Diane; Green, Jennifer Greif

    2008-01-01

    This study investigates the role of school connectedness in mediating the relation between students' sense of hope and life satisfaction for three groups: Bullied Victims, Peer Victims, and Nonvictims. Students in grades 5 to 12 (N = 866) completed the California Bully/Victim Scale, School Connectedness Scale, Children's Hope Scale, and Students'…

  3. Pupils as Victims of Peer Violence

    Directory of Open Access Journals (Sweden)

    Cvek Mihaela

    2013-11-01

    Full Text Available The school is an educational institution that has to provide appropriate control of adults over pupils, which they do. Nevertheless, violence cannot be avoided. Pupils encounter peer violence in different roles, as observers, victims, perpetrators, or both. The objective of our research was to examine how often pupils are victims of peer violence, and to what extent the latter depends on pupils’ gender and age. The results of the research made among pupils in the fifth, seventh, and eighth grades of various primary schools across Slovenia showed that 24.1 per cent of pupils had already been victims of peer violence. The ones that they tend to tell about such episodes are their parents. The results have also shown that school is really a place where violence is very common, and that psychological and verbal abuse are the most common types of violence used.

  4. Bile acids for viral hepatitis

    DEFF Research Database (Denmark)

    Chen, Weikeng; Liu, J; Gluud, C

    2003-01-01

    The viral hepatitides are common causes of liver diseases globally. Trials have assessed bile acids for patients with viral hepatitis, but no consensus was reached regarding their usefulness.......The viral hepatitides are common causes of liver diseases globally. Trials have assessed bile acids for patients with viral hepatitis, but no consensus was reached regarding their usefulness....

  5. Viral hemorrhagic septicemia

    Science.gov (United States)

    Batts, William N.; Winton, James R.

    2012-01-01

    Viral hemorrhagic septicemia (VHS) is one of the most important viral diseases of finfish worldwide. In the past, VHS was thought to affect mainly rainbow trout Oncorhynchus mykiss reared at freshwater facilities in Western Europe where it was known by various names including Egtved disease and infectious kidney swelling and liver degeneration (Wolf 1988). Today, VHS is known as an important source of mortality for cultured and wild fish in freshwater and marine environments in several regions of the northern hemisphere (Dixon 1999; Gagné et al. 2007; Kim and Faisal 2011; Lumsden et al. 2007; Marty et al. 1998, 2003; Meyers and Winton 1995; Skall et al. 2005b; Smail 1999; Takano et al. 2001). Viral hemorrhagic septicemia is caused by the fish rhabdovirus, viral hemorrhagic septicemia virus (VHSV), a member of the genus Novirhabdovirus of the family Rhabdoviridae

  6. Development and validation of the multidimensional offline and online peer victimization scale

    NARCIS (Netherlands)

    Sumter, S.R.; Valkenburg, P.M.; Baumgartner, S.E.; Peter, J.; van der Hof, S.

    2015-01-01

    Peer victimization can seriously impair one’s well-being. As youth spend more time on the Internet, a new form of peer victimization has emerged, namely, online peer victimization. To fully comprehend peer victimization among today’s youth, there is a need for a psychometrically sound measure that

  7. ViralORFeome: an integrated database to generate a versatile collection of viral ORFs.

    Science.gov (United States)

    Pellet, J; Tafforeau, L; Lucas-Hourani, M; Navratil, V; Meyniel, L; Achaz, G; Guironnet-Paquet, A; Aublin-Gex, A; Caignard, G; Cassonnet, P; Chaboud, A; Chantier, T; Deloire, A; Demeret, C; Le Breton, M; Neveu, G; Jacotot, L; Vaglio, P; Delmotte, S; Gautier, C; Combet, C; Deleage, G; Favre, M; Tangy, F; Jacob, Y; Andre, P; Lotteau, V; Rabourdin-Combe, C; Vidalain, P O

    2010-01-01

    Large collections of protein-encoding open reading frames (ORFs) established in a versatile recombination-based cloning system have been instrumental to study protein functions in high-throughput assays. Such 'ORFeome' resources have been developed for several organisms but in virology, plasmid collections covering a significant fraction of the virosphere are still needed. In this perspective, we present ViralORFeome 1.0 (http://www.viralorfeome.com), an open-access database and management system that provides an integrated set of bioinformatic tools to clone viral ORFs in the Gateway(R) system. ViralORFeome provides a convenient interface to navigate through virus genome sequences, to design ORF-specific cloning primers, to validate the sequence of generated constructs and to browse established collections of virus ORFs. Most importantly, ViralORFeome has been designed to manage all possible variants or mutants of a given ORF so that the cloning procedure can be applied to any emerging virus strain. A subset of plasmid constructs generated with ViralORFeome platform has been tested with success for heterologous protein expression in different expression systems at proteome scale. ViralORFeome should provide our community with a framework to establish a large collection of virus ORF clones, an instrumental resource to determine functions, activities and binding partners of viral proteins.

  8. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  9. Dating violence and interpersonal victimization among a national sample of Latino youth.

    Science.gov (United States)

    Cuevas, Carlos A; Sabina, Chiara; Bell, Kristin A

    2014-10-01

    The purpose of this analysis was (1) to provide the rates of dating violence victimization among a national sample of Latino adolescents, (2) to determine the degree to which different forms of dating violence victimization co-occurred for this sample, and (3) to determine how much dating violence victimization overlapped with other forms of non-partner-perpetrated victimization. This analysis used data from the Dating Violence Among Latinos Study, which surveyed 1,525 Latino adolescents between the ages of 12 and 18 years about past-year dating violence and non-partner-perpetrated victimization. We calculated victimization rates and relative risk ratios to evaluate the co-occurrence among different forms of dating violence victimization as well as the co-occurrence of dating violence and other forms of victimization. Results show elevated rates of dating violence victimization compared with previous studies, which is primarily accounted for by psychological dating violence. The rate of dating violence appears to precipitously increase starting around ages 13 and 14 years and is consistently higher for boys. Each type of dating violence was significantly associated with other forms of dating violence (e.g., physical and psychological). Dating violence was significantly associated with experiencing conventional crime, peer or sibling victimization, and nonpartner sexual victimization as well as being a polyvictim. The results support the importance of early prevention efforts with Latino youth and addressing dating violence with both sexes. Furthermore, dating violence should be seen as a potential risk marker for youth who are experiencing multiple forms of victimization. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  10. UGGT1 enhances enterovirus 71 pathogenicity by promoting viral RNA synthesis and viral replication.

    Directory of Open Access Journals (Sweden)

    Peng-Nien Huang

    2017-05-01

    Full Text Available Positive-strand RNA virus infections can induce the stress-related unfolded protein response (UPR in host cells. This study found that enterovirus A71 (EVA71 utilizes host UDP-glucose glycoprotein glucosyltransferase 1 (UGGT1, a key endoplasmic reticulum protein (ER involved in UPR, to enhance viral replication and virulence. EVA71 forms replication complexes (RCs on cellular membranes that contain a mix of host and viral proteins to facilitate viral replication, but the components and processes involved in the assembly and function of RCs are not fully understood. Using EVA71 as a model, this study found that host UGGT1 and viral 3D polymerase co-precipitate along with other factors on membranous replication complexes to enhance viral replication. Increased UGGT1 levels elevated viral growth rates, while viral pathogenicity was observed to be lower in heterozygous knockout mice (Uggt1 +/- mice. These findings provide important insight on the role of UPR and host UGGT1 in regulating RNA virus replication and pathogenicity.

  11. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  12. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  13. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  14. Competing Victimizations or Multidirectional Soli-daties? Politics of Collective Memory and Solidarity in the Post-National Socialist and Post-Colonial Austrian Left

    Directory of Open Access Journals (Sweden)

    Julia Edthofer

    2014-03-01

    Full Text Available In this article I illustrate “competing victimizations” and propose possible “multidirectional solidarities” regarding inner-left debates about the Middle East conflict, anti-Semitism and racism in Viennese left-wing contexts. The illustrated conflict is specific for radical left-wing politics in a post-National Socialist and post-colonial setting. Debates initially revolve around Israel versus Palestine solidarity. In the wake of the Second Intifada and the September 11 attacks they partly divide anti-fascist and anti-racist political stances. While the pro-Israeli camp focuses on the Holocaust, Austrian guilt-deflection and current anti-Semitism, the pro-Palestinian side condemns the Israeli occupation and fights growing anti-Muslim racism. In this context, opposing perspectives on the relation of new anti-Semitism and anti-Muslim racism are articulated. Such competing dynamics and their interrelation with Austrian memory politics and global politics are illustrated.  Subsequently, they are discussed as being related to conflicting memories and interrelated competing victimizations in migrant societies with a National Socialist history, such as in Austria and Germany. Concluding, the concept of “multidirectional solidarity” is proposed as an alternative approach, transcending competitive views on past and current victimizations.

  15. Of virtual victims and victimized virtues: differential effects of experienced aggression in video games on social cooperation.

    Science.gov (United States)

    Rothmund, Tobias; Gollwitzer, Mario; Klimmt, Christoph

    2011-01-01

    Two experimental studies were used to investigate how interacting with aggressive virtual characters in video games affects trust and cooperation of players. Study 1 demonstrates that experiencing virtual aggression from a victim's perspective can impair players' investments in a subsequent common goods dilemma situation. This effect is mediated by reduced expectations of trust in the cooperativeness of interaction partners. In Study 2 the same effect was replicated by using a different cooperation task and by investigating the moderating role of justice sensitivity from a victim's perspective as a dispositional factor. Participants transferred less money to an unknown partner in a trust game after exposure to aggressive nonplayer characters in a video game. This effect was stronger for people high in victim sensitivity. Results of both studies can be interpreted in line with the sensitivity to mean intentions model and add to the body of research on violent media effects.

  16. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  17. Longitudinal Associations in Youth Involvement as Victimized, Bullying, or Witnessing Cyberbullying.

    Science.gov (United States)

    Holfeld, Brett; Mishna, Faye

    2018-04-01

    Although cyberbullying has been linked to cyber victimization, it is unknown whether witnessing cyberbullying impacts and is impacted by experiences of cyberbullying and victimization. In the current study, we examine the frequency of youth involved as victimized, bullying, and witnessing cyberbullying and how these experiences are associated across three academic years. Participants comprised 670 Canadian students who began the longitudinal study in grades 4, 7, or 10 at Time 1 (T1). Cyber witnessing represented the largest role of youth involvement in cyberbullying. Cyber witnessing was positively associated with both cyberbullying and victimization. Cyber victimization at T1 was positively associated with cyber witnessing at T2, which was positively related to both cyberbullying and victimization at T3. Findings highlight the significance of addressing the role of cyber witnesses in cyberbullying prevention and intervention efforts.

  18. Domestic Violence and the Victim/Offender Overlap Across the Life Course.

    Science.gov (United States)

    Iratzoqui, Amaia

    2018-07-01

    The current article examined the overlap of domestic violence across the life course, connecting childhood abuse and adolescent dating victimization to adult intimate partner victimization, and the connection between these behaviors and adult domestic violence perpetration against partners and children. Using three waves of Add Health data, the study found that childhood and adolescent domestic victimization were directly and indirectly linked to adult intimate partner victimization and that domestic violence perpetration also played a role. These findings indicate that offending must be accounted for in tracking patterns of victimization over the life course and that the overlap must more directly be reconciled in current criminal justice policy.

  19. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Allometric relationships of the dentition of the great White Shark, Carcharodon carcharias, in forensic investigations of shark attacks.

    Science.gov (United States)

    Nambiar, P; Bridges, T E; Brown, K A

    1991-06-01

    As a result of a systematic morphometric study of shark dentitions, a system of notation for describing the location of shark teeth has been developed and is proposed as a standard to be adopted for use in similar studies in the future. The macroscopic morphology of White Shark teeth has been characterised in order to gain quantitative data which might assist in identification of these sharks from bite marks on victims or objects or from shark carcasses. Using these data, a nomogram has been developed which can be used to estimate the body length of a White Shark from measurements of tooth or bite mark morphology. An example of the forensic application of such allometric data is provided as it applied to a recent fatal attack on a diver by a White Shark.

  2. “Stripped”: an analysis of revenge porn victims’ lives after victimization

    OpenAIRE

    Bates, Samantha Lynn

    2015-01-01

    This study examines the experiences of female revenge porn victims. To date, no other academic studies have exclusively focused on experiences of victimization in revenge porn cases. Researchers have focused on legal and moral aspects of revenge porn rather than on victims’ experiences. In-depth qualitative interviews were conducted between February 2014 and January 2015 with 18 revenge porn victims to understand how they experienced victimization and its effects on their lives. Inductive ana...

  3. Viral Marketing

    OpenAIRE

    Sorina Raula Gîrboveanu; Silvia Puiu

    2008-01-01

    With consumers showing increasing resistance to traditional forms of advertising such as TV or newspaper ads, marketers have turned to alternate strategies, including viral marketing. Viral marketing exploits existing social networks by encouraging customers to share product information with their friends.In our study we are able to directly observe the effectiveness of person to person word of mouth advertising for hundreds of thousands of products for the first time

  4. Family victim advocates: the importance of critical job duties

    Directory of Open Access Journals (Sweden)

    Teresa H. Young

    Full Text Available Child advocacy centers across the United States intervened in more than 250,000 child abuse cases in 2011(National Children's Alliance, 2012. Understanding the work of family victim advocates is imperative to helping children and families in child abuse cases. In this exploratory study, we surveyed advocates and program directors from child advocacy centers (CACs across the United States to compare their perceptions of the critical job duties of family victim advocates. Data analysis revealed that CAC directors rated the importance of these duties significantly higher than family victim advocates. Results suggest the need for additional training to ensure that family victim advocates understand the importance of critical job duties to meet the needs of children and families in child abuse cases.

  5. The management of victims of collective accidents. Methodological guide

    International Nuclear Information System (INIS)

    Meadel, Juliette; Marie, Eugenie; Badorc, Yves; Riviere, Anne; Chalaux, Marion; Heisserer, Julie; Tosello-Orsola, Romain; Gelli, Robert; Boura, Florent; Sookahet, Stephanie; Deparis, Benjamin; Tarabeux, Xavier; Besson, Jean-Paul; Porterie, Frederique; Paris-Muller, Gaelle; Marchelli, Sylvie; Gesret, Samuel; Guthleben, Sandra; Sauvee, Marie-Line; Percie Du Sert, Xavier; Bossuyt, Yves; Viteau, Thierry; Etienne-Diener, Annick; Le Caro, Sylvie; Taffin, Monique; Deluz, Damien; Cremniter, Didier; Philippe, Jean-Marc; Ouvrard, Anne-Emmanuelle; Andre, Jean-Marc; Lansman, Patrick; Jouty, Remi; Delbono, Martine; Cebe, Philippe; Le Divenah, Jean-Paul; Vandoorne, Pierre-Jean; Bertin, Jerome; Sadowski, Isabelle; Bovis, Marcel; Gicquel, Stephane; Seco, Sophia; Ieche, Clara; Bertrand, Paul; Tricot, Sandrine; Gomes, Thierry; Marissal, Jean-Luc; Voss, Beatrice; Mescam, Marie; Le Chevalier, Elisabeth; Bouchet, Loic; Lienhard, Claude; Dantchev, Nicolas; Delval, Christophe; Naudascher, Michel; Sublet, Xavier; Cutajar, Chantal; Trestard, Jean-Francois; Quentin, Cecile

    2017-11-01

    This publication proposes several sets of sheets. A first set concerns the crisis phase itself and sheets present or describe the coordination during an emergency phase, the role of the public prosecutor, the role of the prefect, the crisis and support Centre of the Ministry for Foreign Affairs, the health management of victims, the mobilisation of association for the support to victims, the role of associations of victims, crisis information telephone numbers, the family welcome centre, information meetings for victims and families, relationships with media. The second set concerns the post-crisis phase: coordination during the follow-up phase, the intervention of insurance providers, and the intervention of lawyers. A last sheet concerns the legal phase with a presentation of the legal procedure

  6. Identification of human trafficking victims in health care settings.

    Science.gov (United States)

    Baldwin, Susie B; Eisenman, David P; Sayles, Jennifer N; Ryan, Gery; Chuang, Kenneth S

    2011-07-14

    An estimated 18,000 individuals are trafficked into the United States each year from all over the world, and are forced into hard labor or commercial sex work. Despite their invisibility, some victims are known to have received medical care while under traffickers' control. Our project aimed to characterize trafficking victims' encounters in US health care settings. The study consisted of semi-structured interviews with six Key Informants who work closely with trafficking victims (Phase I) and 12 female trafficking survivors (Phase II). All survivors were recruited through the Coalition to Abolish Slavery and Trafficking, an NGO in Los Angeles, and all were trafficked into Los Angeles. Interviews were conducted in English and six other languages, with the assistance of professional interpreters. Using a framework analysis approach that focused on victims' encounters in health care settings, we assessed interview transcript content and coded for themes. We used an exploratory pile-sorting technique to aggregate similar ideas and identify overarching domains. The survivors came from 10 countries. Eight had experienced domestic servitude, three had survived sex trafficking, and one had experienced both. Half the survivors reported that they had visited a physician while in their traffickers' control, and another worked in a health care facility. All Key Informants described other victims who had received medical care. For domestic servants, medical visits were triggered by injury and respiratory or systemic illness, while sex trafficking victims were seen by health professionals for sexually transmitted infections and abortion. Trafficking victims were prevented from disclosing their status to health care providers by fear, shame, language barriers, and limited interaction with medical personnel, among other obstacles. This exploration of survivors' experiences in health care settings supports anecdotal reports that US health care providers may unwittingly encounter

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  8. Family and school socioeconomic disadvantage: interactive influences on adolescent dating violence victimization.

    Science.gov (United States)

    Spriggs, Aubrey L; Halpern, Carolyn Tucker; Herring, Amy H; Schoenbach, Victor J

    2009-06-01

    Although low socioeconomic status has been positively associated with adult partner violence, its relationship to adolescent dating violence remains unclear. Further, few studies have examined the relationship between contextual disadvantage and adolescent dating violence, or the interactive influences of family and contextual disadvantage. Guided by social disorganization theory, relative deprivation theory, and gendered resource theory, we analyzed data from the U.S. National Longitudinal Study of Adolescent Health (1994-1996) to explore how family and school disadvantage relate to dating violence victimization. Psychological and minor physical victimization were self-reported by adolescents in up to six heterosexual romantic or sexual relationships. Family and school disadvantage were based on a principal component analysis of socioeconomic indicators reported by adolescents and parents. In weighted multilevel random effects models, between-school variability in dating violence victimization was proportionately small but substantive: 10% for male victimization and 5% for female victimization. In bivariate analyses, family disadvantage was positively related to victimization for both males and females; however, school disadvantage was only related to males' physical victimization. In models adjusted for race/ethnicity, relative age within the school, and mean school age, neither family nor school disadvantage remained related to males' victimization. For females, family disadvantage remained significantly positively associated with victimization, but was modified by school disadvantage: family disadvantage was more strongly associated with dating violence victimization in more advantaged schools. Findings support gendered resource theory, and suggest that status differentials between females and their school context may increase their vulnerability to dating violence victimization.

  9. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  10. Pathways From Bullying Perpetration, Victimization, and Bully Victimization to Suicidality Among School-Aged Youth: A Review of the Potential Mediators and a Call for Further Investigation.

    Science.gov (United States)

    Hong, Jun Sung; Kral, Michael J; Sterzing, Paul R

    2015-10-01

    In the wake of several highly publicized adolescent suicides attributed to bullying victimization, national attention has been brought to bear on the profound public health problem of bullying. This article reviews the extant literature on the associations between bullying perpetration, victimization, and thoughts of or attempts at suicide and proposes five potential mediators, namely depression, anxiety, low self-esteem, loneliness, and hopelessness, that may explain this relationship. Numerous studies have found empirical support for the interrelations between internalizing behaviors and both bullying perpetration and victimization and suicide. We find that further longitudinal research needs to be conducted to more conclusively determine the role and causal ordering these various psychosocial factors may play in bullying perpetration, victimization, and suicide. Although the research literature implies causal directions among all these potential mediators, untangling the unique influence of bullying perpetration, victimization, and bully victimization on suicide and its mechanisms of action has major research and practice implications. © The Author(s) 2014.

  11. Victim Simulator for Victim Detection Radar

    Science.gov (United States)

    Lux, James P.; Haque, Salman

    2013-01-01

    Testing of victim detection radars has traditionally used human subjects who volunteer to be buried in, or climb into a space within, a rubble pile. This is not only uncomfortable, but can be hazardous or impractical when typical disaster scenarios are considered, including fire, mud, or liquid waste. Human subjects are also inconsistent from day to day (i.e., they do not have the same radar properties), so quantitative performance testing is difficult. Finally, testing a multiple-victim scenario is difficult and expensive because of the need for multiple human subjects who must all be coordinated. The solution is an anthropomorphic dummy with dielectric properties that replicate those of a human, and that has motions comparable to human motions for breathing and heartbeat. Two airfilled bladders filled and drained by solenoid valves provide the underlying motion for vinyl bags filled with a dielectric gel with realistic properties. The entire assembly is contained within a neoprene wetsuit serving as a "skin." The solenoids are controlled by a microcontroller, which can generate a variety of heart and breathing patterns, as well as being reprogrammable for more complex activities. Previous electromagnetic simulators or RF phantoms have been oriented towards assessing RF safety, e.g., the measurement of specific absorption rate (SAR) from a cell phone signal, or to provide a calibration target for diagnostic techniques (e.g., MRI). They are optimized for precise dielectric performance, and are typically rigid and immovable. This device is movable and "positionable," and has motion that replicates the small-scale motion of humans. It is soft (much as human tissue is) and has programmable motions.

  12. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  13. Child human trafficking victims: challenges for the child welfare system.

    Science.gov (United States)

    Fong, Rowena; Berger Cardoso, Jodi

    2010-08-01

    Since the passing of the Victims of Trafficking and Violence Protection Act in 2000 and its reauthorization by President George Bush in 2008, federal, state and community efforts in identifying and providing services for victims of human trafficking have significantly improved. However, most of the research and resources for trafficking victims have been directed towards adults rather than children. Researchers agree that there is a growing number of sexually exploited and trafficked children in the United States yet few programs emphasize the unique experiences and special needs of this population. This article examines commercial sexual exploitation of children; differentiates the needs and problems between child prostitution and victims of human trafficking; reviews and critiques current treatment practices; and summarizes challenges and successes in working with child victims of human trafficking, offering practice and policy recommendations. Published by Elsevier Ltd.

  14. Sexual Harassment Victims: Psycholegal and Family Therapy Considerations.

    Science.gov (United States)

    Woody, Robert Henley; Perry, Nancy Walker

    1993-01-01

    Examines legal proscriptions and practical definitions of sexual harassment, describes psychological effects of sexual harassment (Sexual Harassment Trauma Syndrome) for victim-client and impact on family system, and offers guidance for family therapy. Focuses on vulnerability of victim-client, reconstruction of self-concept as primary goal of…

  15. Perceptions and Correlates of Peer-Victimization and Bullying

    Science.gov (United States)

    Hunter, Simon C.; Boyle, James M. E.; Warden, David

    2007-01-01

    Background: The experiences of peer-victimization and bullying are often treated empirically as though they are conceptually indistinct. Both involve repeated aggression, but definitions of bullying additionally emphasize the importance of aggressor intent and imbalance of power between the aggressor and the victim (Olweus, 1978; Whitney &…

  16. Radiological emergency: road map for radiation accident victim transport

    International Nuclear Information System (INIS)

    Costa, V.S.G.; Alcantara, Y.P.; Lima, C.M.A.; Silva, F. C. A. da

    2017-01-01

    During a radiological or nuclear emergency, a number of necessary actions are taken, both within the radiation protection of individuals and the environment, involving many institutions and highly specialized personnel. Among them it is possible to emphasize the air transportation of radiation accident victims.The procedures and measures for the safe transport of these radiation accident victims are generally the responsibility of the armed forces, specifically the Aeronautics, with the action denominated 'Aeromedical Military Evacuation of Radiation Accident Victims'. The experience with the Radiological Accident of Goiânia demonstrated the importance of adequate preparation and response during a radiological emergency and the need for procedures and measures with regard to the transport of radiation victims are clearly defined and clearly presented for the effectiveness of the actions. This work presents the necessary actions for the transport of radiation accident victim during a radiological emergency, through the road map technique, which has been widely used in scientific technical area to facilitate understanding and show the way to be followed to reach the proposed objectives

  17. Violent victimization of adult patients with severe mental illness: a systematic review.

    Science.gov (United States)

    Latalova, Klara; Kamaradova, Dana; Prasko, Jan

    2014-01-01

    The aims of this paper are to review data on the prevalence and correlates of violent victimization of persons with severe mental illness, to critically evaluate the literature, and to explore possible approaches for future research. PubMed/MEDLINE and PsycINFO databases were searched using several terms related to severe mental illness in successive combinations with terms describing victimization. The searches identified 34 studies. Nine epidemiological studies indicate that patients with severe mental illness are more likely to be violently victimized than other community members. Young age, comorbid substance use, and homelessness are risk factors for victimization. Victimized patients are more likely to engage in violent behavior than other members of the community. Violent victimization of persons with severe mental illness has long-term adverse consequences for the course of their illness, and further impairs the quality of lives of patients and their families. Victimization of persons with severe mental illness is a serious medical and social problem. Prevention and management of victimization should become a part of routine clinical care for patients with severe mental illness.

  18. Childhood victimization and inflammation in young adulthood: A genetically sensitive cohort study.

    Science.gov (United States)

    Baldwin, Jessie R; Arseneault, Louise; Caspi, Avshalom; Fisher, Helen L; Moffitt, Terrie E; Odgers, Candice L; Pariante, Carmine; Ambler, Antony; Dove, Rosamund; Kepa, Agnieszka; Matthews, Timothy; Menard, Anne; Sugden, Karen; Williams, Benjamin; Danese, Andrea

    2018-01-01

    Childhood victimization is an important risk factor for later immune-related disorders. Previous evidence has demonstrated that childhood victimization is associated with elevated levels of inflammation biomarkers measured decades after exposure. However, it is unclear whether this association is (1) already detectable in young people, (2) different in males and females, and (3) confounded by genetic liability to inflammation. Here we sought to address these questions. Participants were 2232 children followed from birth to age 18years as part of the Environmental Risk (E-Risk) Longitudinal Twin Study. Childhood victimization was measured prospectively from birth to age 12years. Inflammation was measured through C-reactive protein (CRP) levels in dried blood spots at age 18years. Latent genetic liability for high inflammation levels was assessed through a twin-based method. Greater exposure to childhood victimization was associated with higher CRP levels at age 18 (serum-equivalent means were 0.65 in non-victimized Study members, 0.74 in those exposed to one victimization type, and 0.81 in those exposed to poly-victimization; p=0.018). However, this association was driven by a significant association in females (serum-equivalent means were 0.75 in non-victimized females, 0.87 in those exposed to one type of victimization, and 1.19 in those exposed to poly-victimization; p=0.010), while no significant association was observed in males (p=0.19). Victimized females showed elevated CRP levels independent of latent genetic influence, as well as childhood socioeconomic status, and waist-hip ratio and body temperature at the time of CRP assessment. Childhood victimization is associated with elevated CRP levels in young women, independent of latent genetic influences and other key risk factors. These results strengthen causal inference about the effects of childhood victimization on inflammation levels in females by accounting for potential genetic confounding. Copyright

  19. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  20. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems

    Directory of Open Access Journals (Sweden)

    Subin Park

    2017-05-01

    Full Text Available We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES, exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  1. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  2. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  3. Characterizing Sexual Violence Victimization in Youth: 2012 National Intimate Partner and Sexual Violence Survey.

    Science.gov (United States)

    Merrick, Melissa T; Basile, Kathleen C; Zhang, Xinjian; Smith, Sharon G; Kresnow, Marcie-Jo

    2018-04-01

    Youth sexual violence victimization is an urgent public health concern that can lead to a variety of health problems and increased risk for victimization during adulthood. Examining the characteristics of early victimization and their association with subsequent victimization during adulthood may help strengthen primary prevention efforts. Data are from the 2012 National Intimate Partner and Sexual Violence Survey. Prevalence estimates were computed in 2017 for rape and made to sexually penetrate, their subtypes, as well as proportions among victims by type of perpetrator. Chi-square tests of association were conducted between youth sexual violence victimization and the same experiences in adulthood. Approximately 10 million U.S. females (8.4%) experienced completed or attempted rape and 1.9 million U.S. males (1.6%) were made to penetrate someone during youth. Most victims knew their perpetrators. Being raped or made to penetrate during youth was associated with increased likelihood of such victimization in adulthood. Females and males experience youth sexual violence victimization at alarming rates. Primary prevention efforts with youth are critical to prevent early victimization, subsequent victimization in adulthood, and the mental and physical health consequences associated with sexual violence victimization. Published by Elsevier Inc.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Value of Sharing: Viral Advertisement

    OpenAIRE

    Duygu Aydın; Aşina Gülerarslan; Süleyman Karaçor; Tarık Doğan

    2013-01-01

    Sharing motivations of viral advertisements by consumers and the impacts of these advertisements on the perceptions for brand will be questioned in this study. Three fundamental questions are answered in the study. These are advertisement watching and sharing motivations of individuals, criteria of liking viral advertisement and the impact of individual attitudes for viral advertisement on brand perception respectively. This study will be carried out via a viral advertise...

  6. Viral Marketing and Academic Institution

    OpenAIRE

    Koktová, Silvie

    2010-01-01

    This bachelor thesis examines modern and constantly developing kind of internet marketing -- the so called viral marketing. It deals with its origin, principle, process, advantages and disadvantages, types of viral marketing and presumptions of creating successful viral campaign. The aim of the theoretical part is especially the understanding of viral marketing as one of the effective instruments of contemporary marketing. In this theoretical part the thesis also elaborates a marketing school...

  7. Cross-National Prevalence of Traditional Bullying, Traditional Victimization, Cyberbullying and Cyber-Victimization: Comparing Single-Item and Multiple-Item Approaches of Measurement

    Science.gov (United States)

    Yanagida, Takuya; Gradinger, Petra; Strohmeier, Dagmar; Solomontos-Kountouri, Olga; Trip, Simona; Bora, Carmen

    2016-01-01

    Many large-scale cross-national studies rely on a single-item measurement when comparing prevalence rates of traditional bullying, traditional victimization, cyberbullying, and cyber-victimization between countries. However, the reliability and validity of single-item measurement approaches are highly problematic and might be biased. Data from…

  8. Relationship between income and repeat criminal victimization in Brazil

    Directory of Open Access Journals (Sweden)

    Marcelo Justus

    2015-09-01

    Full Text Available This study analyzes the effect of income on repeat criminal victimization in Brazil using data from the 2009 National Household Sample Survey and its special supplement on victimization and access to justice. Two count-data models were estimated for four types of crime: theft, robbery, attempted theft/robbery, and physical assault. A positive nonlinear effect of income on repeat victimization for the three types of property crimes and a negative nonlinear effect of income on physical assault were observed.

  9. Peer Victimization and Academic Performance in Primary School Children.

    Science.gov (United States)

    Mundy, Lisa K; Canterford, Louise; Kosola, Silja; Degenhardt, Louisa; Allen, Nicholas B; Patton, George C

    Peer victimization is a common antecedent of poor social and emotional adjustment. Its relationship with objectively measured academic performance is unclear. In this study we aimed to quantify the cross-sectional associations between peer victimization and academic performance in a large population sample of children. Eight- to 9-year-old children were recruited from a stratified random sample of primary schools in Australia. Academic performance was measured on a national achievement test (1 year of learning equals 40 points). Physical and verbal victimization were measured according to child self-report. Multilevel mixed-effects linear regression analyses were conducted. For female children, verbal victimization was associated with poorer academic performance on writing (β = 17.2; 95% confidence interval [CI], -28.2 to -6.2) and grammar/punctuation (β = -20.8; 95% CI, -40.1 to -1.6). Physical victimization was associated with poorer performance on numeracy (male children: β = -29.0; 95% CI, -53.8 to -4.1; female children: β = -30.1; 95% CI, -56.6 to -3.5), and writing (female children: β = -21.5; 95% CI, -40.4 to -2.7). Verbal and physical victimization were associated with poorer performance on reading (male children: β = -31.5; 95% CI, -59.9 to -3.1; female children: β = -30.2; 95% CI, -58.6 to -1.8), writing (female children: β = -25.5; 95% CI, -42.8 to -8.2), spelling (female children: β = -32.3; 95% CI, -59.6 to -4.9), and grammar/punctuation (female children: β = -32.2; 95% CI, -62.4 to -2.0). Children who were physically victimized were 6 to 9 months behind their non-victimized peers on measures of academic performance. There are growing reasons for education systems to invest in the prevention of bullying and promotion of positive peer relationships from the earliest years of school. Copyright © 2017 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  10. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  11. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  12. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics

    Science.gov (United States)

    Sontag, Lisa M.; Clemans, Katherine H.; Graber, Julia A.; Lyndon, Sarah T.

    2011-01-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically…

  13. Teenage intimate partner violence: Factors associated with victimization among Norwegian youths.

    Science.gov (United States)

    Hellevik, Per; Øverlien, Carolina

    2016-07-06

    The aim of the present study was threefold: (1) learn more about factors associated with teenage intimate partner violence (IPV) victimization; (2) explore aspects of digital media use in connection with teenage IPV; (3) and compare the impact IPV victimization has on boys and girls. Survey data from 549 Norwegian students, mean age 15.2 years, who had experience(s) with being in intimate relationship(s), were examined. Experiences with psychological, physical, digital, and sexual violence were analyzed. In total, 42.9% of the participants had experienced some form of IPV: 29.1% had experienced digital violence; 25.9% had experienced psychological violence; 18.8% had experienced sexual violence; and 12.8% had experienced physical violence. Factors significantly associated with teenage IPV victimization were female gender, older partners, domestic violence, bullying victimization, low academic achievements, and sending sexual messages via digital media. Girls reported to be significantly more negatively impacted by the victimization than boys. CONCLUSIONS SOME TEENAGERS EXPERIENCE VICTIMIZATION IN THEIR INTIMATE RELATIONSHIPS, AND FOR MANY DIGITAL MEDIA SEEMS TO PLAY A CENTRAL ROLE IN THIS VIOLENCE TEENAGERS WHO EXPERIENCE VICTIMIZATION OUTSIDE THEIR RELATIONSHIPS OR HAVE RISKY LIFESTYLES HAVE A HIGHER RISK OF EXPERIENCING IPV VICTIMIZATION A FOCUS ON TEENAGE IPV, AND ESPECIALLY DIGITAL MEDIA'S ROLE IN THIS VIOLENCE, IS NEEDED IF THIS PUBLIC HEALTH ISSUE IS TO BE COMBATED. © 2016 the Nordic Societies of Public Health.

  14. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  16. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Childhood clumsiness and peer victimization: a case–control study of psychiatric patients

    Science.gov (United States)

    2013-01-01

    Background Poor motor and social skills as well as peer victimization are commonly reported in both ADHD and autism spectrum disorder. Positive relationships between poor motor and poor social skills, and between poor social skills and peer victimization, are well documented, but the relationship between poor motor skills and peer victimization has not been studied in psychiatric populations. Method 277 patients (133 males, 144 females), mean age 31 years, investigated for ADHD or autism spectrum disorder in adulthood and with normal intelligence, were interviewed about childhood peer victimization and examined for gross motor skills. The parents completed a comprehensive questionnaire on childhood problems, the Five to Fifteen. The Five to Fifteen is a validated questionnaire with 181 statements that covers various symptoms in childhood across eight different domains, one of them targeting motor skills. Regression models were used to evaluate the relationship between motor skills and the risk and duration of peer victimization, adjusted for sex and diagnosis. Results Victims were described as more clumsy in childhood than their non-victimized counterparts. A significant independent association was found between reportedly poor childhood gross motor skills and peer victimization (adjusted odds ratio: 2.97 [95% confidence interval: 1.46-6.07], n = 235, p = 0.003). In adulthood, the victimized group performed worse on vertical jumps, a gross motor task, and were lonelier. Other factors that were expected to be associated with peer victimization were not found in this highly selected group. Conclusion Poor gross motor skills constitute a strong and independent risk factor for peer victimization in childhood, regardless of sex, childhood psychiatric care and diagnosis. PMID:23442984

  18. A Latent Class Analysis of Victimization among Middle and High School Students in California

    Science.gov (United States)

    Berkowitz, Ruth; De Pedro, Kris Tunac; Gilreath, Tamika D.

    2015-01-01

    School victimization is associated with negative social-emotional outcomes and risky behaviors. Most studies have provided definitions and measures of victimization, depicting a limited characterization of victimization in schools. More nuanced analyses of school victimization are needed to assess the heterogeneous pattern of victimization in…

  19. Multiple victimization experiences of urban elementary school students: associations with psychosocial functioning and academic performance.

    Science.gov (United States)

    Holt, Melissa K; Finkelhor, David; Kantor, Glenda Kaufman

    2007-05-01

    This study explored the victimization experiences of urban elementary school students to determine whether subsets of youth emerged with similar victimization profiles (e.g., no victimization, multiple types of victimization). It also evaluated whether multiple victimization was associated with greater psychological distress and lower academic performance. Participants were 689 fifth grade students from an urban, ethnically diverse school district in the Northeast. Youth completed self-report measures in school about bullying victimization, victimization in the home and community, and psychosocial functioning. Cluster analysis suggested the existence of three distinct youth profiles: those with minimal victimization, those victimized primarily by their peers, and those with multiple types of victimizations. As hypothesized, youth with multiple victimizations experienced more psychological distress and earned lower grades than their peers. Findings highlight the heterogeneity of youth victimization experiences and their relations to functioning, and have implications for treatment planning among practitioners working with youth.

  20. Hybrid Client Side Phishing Websites Detection Approach

    OpenAIRE

    Firdous Kausar; Bushra Al-Otaibi; Asma Al-Qadi; Nwayer Al-Dossari

    2014-01-01

    Phishing tricks to steal personal or credential information by entering victims into a forged website similar to the original site, and urging them to enter their information believing that this site is legitimate. The number of internet users who are becoming victims of phishing attacks is increasing beside that phishing attacks have become more sophisticated. In this paper we propose a client-side solution to protect against phishing attacks which is a Firefox extension integrated as a tool...

  1. Depression as a mediator between family factors and peer-bullying victimization in Latino adolescents.

    Science.gov (United States)

    Yabko, Brandon A; Hokoda, Audrey; Ulloa, Emilio C

    2008-01-01

    The purpose of this study was to assess the mediating role of depression in three different relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Results from 242 Latino middle school adolescents from a large southwestern city bordering Mexico revealed that both boys' and girls' peer victimization were related to familial factors and depression. Regression analyses for boys revealed that depression mediated three relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Depression also mediated the relationship between fathers' power-assertive parenting and girls' victimization by peers. The findings support the development of family-based interventions for peer victimization that include curriculum addressing depression.

  2. Online frauds:learning from victims why they fall for these scams

    OpenAIRE

    Button, Mark; McNaughton Nicholls, Carol; Kerr, Jane; Owen, Rachael

    2014-01-01

    Online frauds have become a major problem in many countries with millions of victims from a wide diversity of scams committed in full or part online. This paper explores the extent and nature of this problem. Using data from depth interviews with 15 online fraud victims, 6 focus groups with a further 48 online fraud victims and interviews with 9 professional stakeholders involved in combating this problem. The paper explores why victims fall for online scams. It identifies a range of reasons ...

  3. "She deserved it": Effects of sexism norms, type of violence, and victim's pre-assault behavior on blame attributions toward female victims and approval of the aggressor's behavior.

    Science.gov (United States)

    Koepke, Sabrina; Eyssel, Friederike; Bohner, Gerd

    2014-04-01

    Effects of ambivalent sexism, sexism norms, victim behavior, and type of violence on male students' reactions to male violence against women in intimate relationships were examined. Participants judged a scenario depicting an act of sexual or non-sexual violence against a female partner who had either shown overtly sexual or non-sexual behavior toward another man. Generally, high (vs. low) hostile sexism, high (vs. low) hostile sexism norm feedback, and victim's overtly sexual (vs. non-sexual) behavior led to stronger victim blame and perceived approval of the aggressor's behavior. The victim of non-sexual violence was blamed more than the rape victim, particularly if she had behaved in an overtly sexual manner.

  4. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  5. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  6. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  7. Effects of poly-victimization on self-esteem and post-traumatic stress symptoms in Spanish adolescents.

    Science.gov (United States)

    Soler, Laia; Paretilla, Clàudia; Kirchner, Teresa; Forns, Maria

    2012-11-01

    This study aims to provide evidence concerning the effects of experiencing multiple forms of victimization (poly-victimization) on self-esteem and post-traumatic stress symptoms in Spanish adolescents. A total of 722 adolescents were recruited from seven secondary schools in Catalonia, Spain. The Rosenberg Self-Esteem Scale, the Youth Self Report and the Juvenile Victimization Questionnaire were employed to assess self-esteem, post-traumatic stress symptoms and victimization, respectively. Participants were divided into three groups (non-victim, victim and poly-victim groups) according to the total number of different kinds of victimization experienced. Results showed that 88.4 % of adolescents had been exposed to at least one kind of victimization. Poly-victimization was associated with a higher number of post-traumatic stress symptoms in both boys and girls. Also, self-liking was significantly lower in the poly-victim group, whereas self-competence was equivalent across the three victimization groups. Girls were approximately twice as likely to report child maltreatment (OR = 1.92) and sexual victimization (OR = 2.41) as boys. In conclusion, the present study adds evidence on the importance of taking account of the full burden of victimizations suffered when studying victimization correlates. Also, it highlights the importance of prevention policies to focus particularly on preserving adolescents' sense of social worth.

  8. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  9. Muslim women and foreign prostitutes: victim discourse, subjectivity, and governance.

    Science.gov (United States)

    Jacobsen, Christine M; Stenvoll, Dag

    2010-01-01

    In this article, we juxtapose the ways “Muslim women” and “foreign prostitutes” are commonly constituted as victims in media and politics. We analyze the functions of these two prototypical female victims in terms of the role they play in epitomizing “the problems of globalization” and in reinforcing the existing social and political structures. Victim discourse, when tied to the transnational proliferation of the sex industry and of (radical) Islam, has depoliticizing effects because it places nonindividual causes of victimization outside of “our” polity and society and casts the state as protector and neutral arbiter of national and global inequalities, marginalization, and social conflict.

  10. Attachment Styles among Bullies, Victims and Uninvolved Adolescents

    Science.gov (United States)

    Koiv, Kristi

    2012-01-01

    Attachment theory provides a frame for understanding the role of attachment styles in the development of bullying behaviour in adolescence. The present study examined attachment styles (secure, avoidant and anxious/ambivalent) that differentiated bullies, victims, bully/victims and uninvolved adolescents. A total of 1,921 students (1,006 girls and…

  11. Relational caring: the use of the victim impact statement by sexually assaulted women.

    Science.gov (United States)

    Miller, Karen-Lee

    2014-01-01

    The victim impact statement (VIS) is a written account of harms experienced as a result of crime. This study investigates VIS use by sexually assaulted women through interviews with Canadian victims, victim services workers, and feminist advocates (N = 35). Findings suggest that victims use the VIS to express relational caring. Relational caring is an ethic of care that prioritizes others through privileging the harms experienced by others because of witnessing the sexual assault or coping with the victim's postassault sequelae, protecting future or hypothetical victims, and promoting the interests of intimate partner offenders. Relational caring challenges traditional conceptions of victim agency and VIS use for instrumental purposes, as well as the targets and temporalities of sexual assault harms that are detailed in the statement. Relational caring has unique implications for victims who are mothers, especially those abused as minors, and for intimate partners. Legal, therapeutic, and social service consequences are discussed.

  12. [Emergent viral infections

    NARCIS (Netherlands)

    Galama, J.M.D.

    2001-01-01

    The emergence and re-emergence of viral infections is an ongoing process. Large-scale vaccination programmes led to the eradication or control of some viral infections in the last century, but new viruses are always emerging. Increased travel is leading to a rise in the importation of exotic

  13. Bullying in schools: the power of bullies and the plight of victims.

    Science.gov (United States)

    Juvonen, Jaana; Graham, Sandra

    2014-01-01

    Bullying is a pervasive problem affecting school-age children. Reviewing the latest findings on bullying perpetration and victimization, we highlight the social dominance function of bullying, the inflated self-views of bullies, and the effects of their behaviors on victims. Illuminating the plight of the victim, we review evidence on the cyclical processes between the risk factors and consequences of victimization and the mechanisms that can account for elevated emotional distress and health problems. Placing bullying in context, we consider the unique features of electronic communication that give rise to cyberbullying and the specific characteristics of schools that affect the rates and consequences of victimization. We then offer a critique of the main intervention approaches designed to reduce school bullying and its harmful effects. Finally, we discuss future directions that underscore the need to consider victimization a social stigma, conduct longitudinal research on protective factors, identify school context factors that shape the experience of victimization, and take a more nuanced approach to school-based interventions.

  14. Victimization and psychopathic features in a population-based sample of Finnish adolescents.

    Science.gov (United States)

    Saukkonen, Suvi; Aronen, Eeva T; Laajasalo, Taina; Salmi, Venla; Kivivuori, Janne; Jokela, Markus

    2016-10-01

    We examined different forms of victimization experiences in relation to psychopathic features and whether these associations differed in boys and girls among 4855 Finnish school adolescents aged 15-16 years. Psychopathic features were measured with the Antisocial Process Screening Device- Self Report (APSD-SR). Victimization was assessed with questions about violent and abusive experiences across lifetime and within the last 12 months. Results from linear regression analysis showed that victimization was significantly associated with higher APSD-SR total scores, more strongly in girls than boys. Recent (12-month) victimization showed significance in the relationship between victimization and psychopathic features; especially recent sexual abuse and parental corporal punishment were strong determinants of higher APSD-SR total scores. The present study demonstrates novel findings on how severe victimization experiences relate to psychopathic features in community youth, especially in girls. The findings underscore the need for comprehensive evaluation of victimization experiences when psychopathic features are present in youth. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Developmental cascade models linking peer victimization, depression, and academic achievement in Chinese children.

    Science.gov (United States)

    Liu, Junsheng; Bullock, Amanda; Coplan, Robert J; Chen, Xinyin; Li, Dan; Zhou, Ying

    2018-03-01

    This study explored the longitudinal relations among peer victimization, depression, and academic achievement in Chinese primary school students. Participants were N = 945 fourth-grade students (485 boys, 460 girls; M age  = 10.16 years, SD = 2 months) attending elementary schools in Shanghai, People's Republic of China. Three waves of data on peer victimization, depression, and academic achievement were collected from peer nominations, self-reports, and school records, respectively. The results indicated that peer victimization had both direct and indirect effects on later depression and academic achievement. Depression also had both direct and indirect negative effects on later academic achievement, but demonstrated only an indirect effect on later peer victimization. Finally, academic achievement had both direct and indirect negative effects on later peer victimization and depression. The findings show that there are cross-cultural similarities and differences in the various transactions that exist among peer victimization, depression, and academic achievement. Statement of contribution What is already known on this subject? Peer victimization directly and indirectly relates to depression and academic achievement. Depression directly and indirectly relates to academic achievement. Academic achievement directly and indirectly relates to depression. What the present study adds? A developmental cascade approach was used to assess the interrelations among peer victimization, depression, and academic achievement. Academic achievement mediates the relation between peer victimization and depression. Depression is related to peer victimization through academic achievement. Academic achievement directly and indirectly relates to peer victimization. Academic achievement is related to depression through peer victimization. © 2017 The British Psychological Society.

  16. Fear of Violent Victimization among the Foreign-Born

    Directory of Open Access Journals (Sweden)

    Viviana ANDREESCU

    2013-05-01

    Full Text Available In general, most studies that examined the relationship immigrants – criminal behavior focused on the immigrants’ involvement in criminal activities as offenders and/or the effects of immigration on crime rates. Only limited research looked at the levels of victimization and perceived safety experienced by immigrants in their receiving countries. Using the most recent available data from the European Social Survey (Round 5/2010, the present quantitative analysis conducted on a representative sample of residents in United Kingdom (N=2422 tries to determine the levels of criminal victimization and fear of violent crime associated with foreign nationals living in a European country, where immigration is generally unpopular. Although foreign-born persons living in United Kingdom appear to have a higher degree of victimization (vicarious and direct than natives, the inter-group difference is not sufficiently large to be significant at p< .05.Nevertheless, compared to natives, first-generation immigrants manifest a significantly higher level of fear of violent victimization. Results also show that in addition to inter-group differences in the levels of perceived unsafety and experiences with victimization, the effects of fear-of-crime correlates vary in intensity among respondents differentiated by their country of birth. In addition, one’s level of acculturation contributes to differences in fear of crime among immigrants.

  17. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  18. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  1. Victims of Domestic Violence and Front-Line Workers: A Helping Paradigm

    Science.gov (United States)

    Peters, Scott W.; Trepal, Heather C.; de Vries, Sabina M.; Day, Sally W.; Leeth, Christopher

    2009-01-01

    Victims of domestic violence present a challenge to law enforcement and emergency room personnel. The authors propose a helping approach to assist these professionals. This paradigm is composed of: active and empathetic listening, acceptance without judgment, identifying victims' strengths, honoring victims as experts, and the process of leaving…

  2. Comparing Victim Attributions and Outcomes for Workplace Aggression and Sexual Harassment

    Science.gov (United States)

    Hershcovis, M. Sandy; Barling, Julian

    2010-01-01

    In 2 studies, we investigated victim attributions (Study 1) and outcomes (Study 2) for workplace aggression and sexual harassment. Drawing on social categorization theory, we argue that victims of workplace aggression and sexual harassment may make different attributions about their mistreatment. In Study 1, we investigated victim attributions in…

  3. Violent victimization of adult patients with severe mental illness: a systematic review

    Directory of Open Access Journals (Sweden)

    Latalova K

    2014-10-01

    Full Text Available Klara Latalova,1,2 Dana Kamaradova,1,2 Jan Prasko1,2 1Faculty of Medicine and Dentistry, Palacky University Olomouc, Olomouc, Czech Republic; 2Department of Psychiatry, University Hospital Olomouc, Olomouc, Czech Republic Abstract: The aims of this paper are to review data on the prevalence and correlates of violent victimization of persons with severe mental illness, to critically evaluate the literature, and to explore possible approaches for future research. PubMed/MEDLINE and PsycINFO databases were searched using several terms related to severe mental illness in successive combinations with terms describing victimization. The searches identified 34 studies. Nine epidemiological studies indicate that patients with severe mental illness are more likely to be violently victimized than other community members. Young age, comorbid substance use, and homelessness are risk factors for victimization. Victimized patients are more likely to engage in violent behavior than other members of the community. Violent victimization of persons with severe mental illness has long-term adverse consequences for the course of their illness, and further impairs the quality of lives of patients and their families. Victimization of persons with severe mental illness is a serious medical and social problem. Prevention and management of victimization should become a part of routine clinical care for patients with severe mental illness. Keywords: victimization, violence, severe mental illness, schizophrenia, bipolar disorder

  4. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  5. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  6. Attitudes of Future Human Service Professionals: The Effects of Victim and Helper Qualities.

    Science.gov (United States)

    Liebkind, Karmela; Eranen, Liisa

    2001-01-01

    Investigates the attitudes of future members in human service professions toward victims, based on the qualities effected by trauma victims and their helpers. Reports that the high-trauma and poorly adapted victims elicited more negative attitudes than did the low-trauma and well-adapted victims. (CMK)

  7. [Effects of Chinese herbal compound for supplementing qi and activating blood circulation on actin, Cx43 expressions and gap junctional intercellular communication functions of myocardial cells in patients with Coxsackie virus B 3 viral myocarditis].

    Science.gov (United States)

    Zhang, Ming-xue; He, Wei; Gu, Ping

    2010-08-01

    To observe the effect of Chinese herbal compound for supplementing qi and activating blood circulation (CHC) on the gap junctional intercellular communication (GJIC) function of myocardial cells in patients with Coxsackie virus B 3 (CVB3) viral myocarditis. Expressions of actin and connexin43 (Cx43) in myocardial cells of patients arranged in three groups (the normal control group, the viral infected group and the CHC treated group) were detected by immunohistochemical method; the fluorescence photobleaching recovery rate of cells was detected by laser scanning confocal microscope. As compared with the viral infected group, the expressions of actin and Cx43 were increased and the GJIC function was improved in the CHC treated group. CHC could antagonize viral injury on skeleton protein, and repair the structure of gap junction channel to improve the GJIC function of myocardial cells after being attacked by CVB3.

  8. Behavioral and Mental Health Correlates of Youth Stalking Victimization: A Latent Class Approach.

    Science.gov (United States)

    Reidy, Dennis E; Smith-Darden, Joanne P; Kernsmith, Poco D

    2016-12-01

    Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. Published by Elsevier Inc.

  9. Police officers' collaboration with rape victim advocates: barriers and facilitators.

    Science.gov (United States)

    Rich, Karen; Seffrin, Patrick

    2013-01-01

    Secondary victimization may occur when rape victims make police reports. This can compromise the quality of official statements and jeopardize criminal cases. Rape reporters receive better treatment by police officers when advocates are involved and best practice police work includes such collaboration. Studies of advocates have described tension, role confusion, and poor communication with police officers. Many variables, including rape myth acceptance (RMA) and training on sexual assault dynamics, may affect officers' collaboration with advocates. There were 429 police officers who responded to a survey measuring their victim interviewing skill, formal training about rape, years on the job, number of victims known personally, number of recent rape cases, RMA, and collaboration with advocates. Results suggest that officers' interviewing skill, years on the job, and specific training are related to collaboration with victim advocates on rape cases. Professional, rather than personal, variables were most predictive of collaboration. Implications for officer selection and training are explored.

  10. Prosocial behavior as a protective factor for children's peer victimization.

    Science.gov (United States)

    Griese, Emily R; Buhs, Eric S

    2014-07-01

    A majority of peer victimization research focuses on its associations with negative outcomes, yet efforts to understand possible protective factors that may mitigate these negative outcomes also require attention. The present study was an investigation of the potential moderating effect of prosocial behaviors on loneliness for youth who are peer victimized. Participants were fourth and fifth grade students (511 total; 49 % boys) who were primarily European American (43.4 %) and Hispanic (48.2 %). Structural Equation Modeling was used to test the interaction of prosocial behavior and peer victimization (relational and overt forms) on loneliness 1 year later. The results indicated that prosocial behavior significantly moderated the relationship between peer victimization (for the relational form only) and loneliness while controlling for levels of perceived peer support. A multi-group comparison by gender further indicated the moderation was significant for boys only. Potential implications for intervention/prevention efforts focused on developing children's prosocial skills as a possible protective factor for relationally victimized youth are discussed.

  11. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  12. Psychological distress among adolescents victims of cyberbullying

    Directory of Open Access Journals (Sweden)

    Jessica Ortega-Barón

    2017-07-01

    Full Text Available The information and communication technologies have rapidly been incorporated and expanded in our society. The age in which children and adolescents get access to electronic devices is decreasing. These devices have big advantages, but they can also be inappropriately used to molest and intimidate other children and, as a result, to cause severe psychological problems to other children. Taking this into consideration, the main objective of this study has been to describe the psychological distress shown by adolescents suffering from cyberbullying. In order to do this, the following variables were registered: depressive symptomatology, perceived stressed, isolation and life satisfaction. The initial sample was formed by 1360 adolescents. From these, 194 from 11 to 18 years old (M = 14.22, SD = 1.81 were selected according to their scores in cybervictimization (43.8 % boys. Participants were divided into three groups according to how intense their cyberbullying victimization was. These were: mild, moderated and severe. Our findings show that there were statistically significant differences between mild and severe victims. Adolescents who were severe cyberbullying victims scored higher in depressive symptomatology and perceived stress, and lower in life satisfaction compared to mild cyberbullying victims. These results and their implications are discussed in order to propose future strategies to prevent cyberbullying.

  13. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  14. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  15. Recognizing victims of human trafficking in the pediatric emergency department.

    Science.gov (United States)

    Becker, Heather J; Bechtel, Kirsten

    2015-02-01

    Human trafficking is a form of modern-day slavery that is rapidly expanding in the United States and throughout the world. It is a crime under both the United States and international law. The child and adult victims of human trafficking are denied their basic human rights and subjected to unspeakable physical and emotional harm. Traffickers exert complete control over their victims and are proficient at hiding their condition from authorities. Healthcare practitioners may be the only professionals who come into contact with victims if they present for medical care. This article will describe human trafficking and its potential victims, as well as guide medical management and access to services that will ensure their safety and restore their freedom.

  16. Relational aggression, victimization, and adjustment during middle childhood.

    Science.gov (United States)

    Ostrov, Jamie M; Godleski, Stephanie A

    2013-08-01

    A secondary analysis of the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development was conducted to test the mechanisms by which relational aggression in third grade was associated both directly and indirectly with relational victimization in sixth grade. A large sample (N = 1,035; 522 girls; M = 8.3 years old; SD = 0.23) and multiple informants (teacher, child, and parent report) and methods were used to test several theoretically driven hypotheses. Our path analysis model suggested evidence for both direct and indirect pathways consistent with the sequential social process model of peer harassment. Relational aggression was significantly associated with future relational victimization even after controlling for physical aggression and gender. Loneliness mediated the direct association between relational aggression and peer victimization. A second model testing the reverse direction of effect revealed that relational victimization in third grade predicted relational aggression in sixth grade and was associated with loneliness and depressive symptoms in fifth grade, but there was no evidence for any of the indirect pathways.

  17. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  18. Rape Myth Consistency and Gender Differences in Perceiving Rape Victims: A Meta-Analysis.

    Science.gov (United States)

    Hockett, Jericho M; Smith, Sara J; Klausing, Cathleen D; Saucier, Donald A

    2016-02-01

    An overview discusses feminist analyses of oppression, attitudes toward rape victims, and previously studied predictors of individuals' attitudes toward rape victims. To better understand such attitudes, this meta-analysis examines the moderating influences of various rape victim, perpetrator, and crime characteristics' rape myth consistency on gender differences in individuals' perceptions of rape victims (i.e., victim responsibility and blame attributions and rape minimizing attitudes). Consistent with feminist theoretical predictions, results indicated that, overall, men perceived rape victims more negatively than women did. However, this sex difference was moderated by the rape myth consistency within the rape vignettes. Implications for research are discussed. © The Author(s) 2015.

  19. Peer Rejection and Internalizing Behavior: The Mediating Role of Peer Victimization in Preschool.

    Science.gov (United States)

    Metin Aslan, Özge

    2018-05-23

    The author examined the relationship among peer rejection, peer victimization, and internalizing behaviors. The author hypothesized that physical and relational victimization would have a different indirect effect on the relationship between peer rejection and internalizing behaviors. Participants were 94 preschool children (37 girls; average age 49.97 months) from two university preschools located in the northern part of the United States. The results indicated that internalizing behaviors predicted the mediating variables only regarding relational victimization. Relational victimization indirectly affected the association between peer rejection and internalizing behaviors. The study provides evidence of the mediating effect of victimization behaviors on the relationship among peer rejection, victimization, and internalizing behaviors.

  20. Relational Aggression, Victimization, and Language Development: Implications for Practice

    Science.gov (United States)

    Ostrov, Jamie M.; Godleski, Stephanie A.

    2007-01-01

    This review explores the development of relational aggression and relational victimization among peers, with specific emphasis on clinical implications for speech-language pathologists. Developmental manifestations of relational aggression and victimization are reviewed from early childhood through emerging adulthood. The concurrent and…