8,425 research outputs found

    The characteristics of sexual abuse in sport: A multidimensional scaling analysis of events described in media reports

    Get PDF
    Most research on sexual abuse has been conducted within family settings (Fergusson & Mullen, 1999). In recent years, following several high profile convictions and scandals, research into sexual abuse has also encompassed institutional and community settings such as sport and the church (Gallagher, 2000; Wolfe et al., 2003). Research into sexual abuse in sport, for example, began with both prevalence studies (Kirby & Greaves, 1996; Leahy, Pretty & Tenenbaum, 2002) and qualitative analyses of the processes and experiences of athlete sexual abuse (Brackenridge, 1997; Cense & Brackenridge, 2001, Toftegaard Nielsen, 2001). From such work, descriptions of the modus operandi of abusers in sport, and the experiences and consequences for athlete victims, have been provided, informing both abuse prevention work and coach education. To date, however, no study has provided empirical support for multiple associations or identified patterns of sex offending in sport in ways that might allow comparisons with research-generated models of offending outside sport. This paper reports on an analysis of 159 cases of criminally defined sexual abuse, reported in the print media over a period of 15 years. The main aim of the study was to identify the nature of sex offending in sport focusing on the methods and locations of offences. The data were analysed using multidimensional scaling (MDS), as a data reduction method, in order to identify the underlying themes within the abuse and explore the inter-relationships of behaviour, victim and context variables. The findings indicate that there are specific themes that can be identified within the perpetrator strategies that include ‘intimate’, ‘aggressive’, and ‘’dominant’ modes of interaction. The same patterns that are described here within the specific context of sport are consistent with themes that emerge from similar behavioural analyses of rapists (Canter & Heritage, 1990; Bishopp, 2003) and child molester groups (Canter, Hughes & Kirby, 1998). These patterns show a correspondence to a broader behavioural model – the interpersonal circumplex (e.g., Leary 1957). Implications for accreditation and continuing professional education of sport psychologists are noted

    Flexibility and Interaction at a Distance: A Mixed-Model Environment For Language Learning

    Get PDF
    This article reports on the process of design and development of two language courses for university students at beginning levels of competence. Following a preliminary experience in a low-tech environment for distance language learning and teaching, and a thorough review of the available literature, we identified two major challenges that would need to be addressed in our design: (1) a necessity to build sufficient flexibility into the materials to cater to a variety of learners' styles, interests and skill levels, therefore sustaining learners' motivation; and (2) a need to design materials that would present the necessary requisites of authenticity and interactivity identified in the examined literature, in spite of the reduced opportunities for face-to-face communication. In response to these considerations, we designed and developed learning materials and tasks to be distributed on CD-ROM, complemented by a WebCT component for added interactivity and task authenticity. Although only part of the original design was implemented, and further research is needed to assess the impact of our environment on learning outcomes, the results of preliminary evaluations are encouraging

    SciTech News Volume 71, No. 1 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11 Reviews Sci-Tech Book News Reviews 12 Advertisements IEEE

    Context-Aware Sensor Fusion For Securing Cyber-Physical Systems

    Get PDF
    The goal of this dissertation is to provide detection and estimation techniques in order to ensure the safety and security of modern Cyber-Physical Systems (CPS) even in the presence of arbitrary sensors faults and attacks. We leverage the fact that modern CPS are equipped with various sensors that provide redundant information about the system\u27s state. In such a setting, the system can limit its dependence on any individual sensor, thereby providing guarantees about its safety even in the presence of arbitrary faults and attacks. In order to address the problem of safety detection, we develop sensor fusion techniques that make use of the sensor redundancy available in modern CPS. First of all, we develop a multidimensional sensor fusion algorithm that outputs a bounded fusion set which is guaranteed to contain the true state even in the presence of attacks and faults. Furthermore, we provide two approaches for strengthening sensor fusion\u27s worst-case guarantees: 1) incorporating historical measurements as well as 2) analyzing sensor transmission schedules (e.g., in a time-triggered system using a shared bus) in order to minimize the attacker\u27s available information and impact on the system. In addition, we modify the sensor fusion algorithm in order to provide guarantees even when sensors might experience transient faults in addition to attacks. Finally, we develop an attack detection technique (also in the presence of transient faults) in order to discard attacked sensors. In addition to standard plant sensors, we note that modern CPS also have access to multiple environment sensors that provide information about the system\u27s context (e.g., a camera recognizing a nearby building). Since these context measurements are related to the system\u27s state, they can be used for estimation and detection purposes, similar to standard measurements. In this dissertation, we first develop a nominal context-aware filter (i.e., with no faults or attacks) for binary context measurements (e.g., a building detection). Finally, we develop a technique for incorporating context measurements into sensor fusion, thus providing guarantees about system safety even in cases where more than half of standard sensors might be under attack

    Background and Method of the Striving to be Strong Study a RCT Testing the Efficacy of a M-health Self-management Intervention

    Get PDF
    Background Osteoporosis is a prevalent and debilitating condition affecting \u3e50% of post-menopausal women. Yet, a low percentage of women regularly engage in health promoting behaviors associated with osteoporosis prevention. Complex, multidimensional, m-Health interventions hold promise to effect engagement in health behavior change related to calcium and vitamin D intake, balance, core and leg strength, and physical activity. Methods Striving to be Strong study (R01NR013913-01) tests the efficacy of a research and theory based, patient centered, dynamically tailored intervention delivered via smart phone apps. Ecological Momentary Assessments (EMAs) enhance immediate feedback and complement traditional measures. The desired outcomes are the maintenance of osteoporosis self-management behaviors and a decrease in the loss of bone density over time. The Individual and Family Self-management Theory provided the conceptual foundation for the study. The sample consists of 290 healthy women between the ages of 40 and 60 with an anticipated attrition of 33%. This three group repeated measures Randomized Clinical Trial spans a 12-month time period. Data collected occurs via web site, smart-phone app, self-report, observation, and measures. Proximal (engagement in osteoporosis health behaviors) and distal (serum vitamin D, DXA, and body composition) outcomes are collected for testing of the efficacy of the intervention and theory evaluation. Discussion Active and rigorous quality management processes continually evaluate enrollment and retention goals, functionality of the automated intervention delivery and data collection systems, EMAs, and dispersion of incentives

    The Use of Marketing Knowledge in Formulating and Enforcing Consumer Protection Policy

    Get PDF
    The purpose of this first chapter of the handbook is to discuss how the findings and approaches offered by the marketing discipline are used in consumer protection policy

    Prelitigation Risk Management: Record Retention

    Get PDF

    Prelitigation Risk Management: Record Retention

    Get PDF

    Integrated Project Management at State-Owned Enterprise Holding Survey Services

    Get PDF
    An ongoing challenge in BKI's project management is the frequent delays in project completion and mismatch of current targets. This article aims to analyze the integrated project management system, digitalization, and the concept of digital governance at PT. Biro Klasifikasi Indonesia (BKI) as the parent company of the State-Owned Enterprise (SOE) Holding Survey Services (IDSurvey). The study used qualitative methods with five dimensions of project efficiency, team satisfaction, impact on customers, business success, and preparing for the future. The results showed that although BKI has planned various business strategies, a strong commitment is needed to resolve project management issues through improved integrated digital governance. This study recommends resolving project management issues through improved integrated project success
    • 

    corecore