3,467 research outputs found
The prevalence, severity and chronicity of abuse towards older men: Insights from a multinational European survey
Background
Elder abuse is a growing public health question among policy makers and practitioners in
many countries. Research findings usually indicate women as victims, whereas male elder
abuse still remains under-detected and under-reported. We aimed to investigate the preva lence, severity and chronicity of abuse (psychological, physical, physical injury, sexual, and
financial) against older men, and to scrutinize factors (e.g. demographics) associated with
high chronicity of any abuse.
Methods
Randomly selected older men (n = 1908) aged 60–84 years from seven European cities
(Ancona, Athens, Granada, Kaunas, Stuttgart, Porto, Stockholm) were interviewed in 2009
via a cross-sectional study concerning abuse exposure during the past 12 months.
Results
Findings suggested that prevalence of abuse towards older men varied between 0.3% (sex ual) and 20.3% (psychological), with severe acts between 0.2% (sexual) and 8.2% (psycho logical). On the whole, higher chronicity values were for injury, followed by psychological,
financial, physical, and sexual abuse. Being from Sweden, experiencing anxiety and having
a spouse/cohabitant/woman as perpetrator were associated with a greater “risk” for high chronicity of any abuse. For men, severity and chronicity of abuse were in some cases rela tively high.
Conclusions
Abuse towards older men, in the light of severe and repeated acts occurring, should be a
source of concern for family, caring staff, social work practice and policy makers, in order to
develop together adequate prevention and treatment strategies.ABUEL Project, "Elder Abuse: A
multinational prevalence survey"European CommissionExecutive
Agency for Health and Consumers (EAHC,
currently CHAFEA, Consumers, Health, Agriculture
and Food Executive AgencyPublic Health Programme
2008–2010 (Grant Agreement n. 2007123
The MIRAS “all-licef” calibration mode
Since each of the individual elements of the MIRAS array is a total power radiometer, the zero-spacing visibility can be obtained by the average of all the corresponding antenna temperatures. The main advantage of this option with respect to using the NIR measurements is that amplitude calibration is more consistent between zero-spacing visibility and the rest. On the other hand, total power radiometers are not usually as stable as noise injection radiometers, so a small loose of stability could be expected. Preliminary results show, however, similar performance.Peer ReviewedPostprint (author's final draft
Security scheme under opensource software for accessing wireless local area networks at the university campus
Wireless networks provide flexibility, increase in productivity, and savings in infrastructure and are useful in organizations with high volume of mobile device users. The services in wireless networks require mechanisms that guarantee their efficient, secure, and reliable use. A security scheme is designed for accessing wireless local area networks (WLAN) at the campus of a Venezuelan university. The confidentiality, integrity, availability (CIA) information security principles are applied, as well as control objectives specified in ISO 27001. The proposed access security scheme mitigates threats, monitors the use of services, and establishes security parameters for reducing attacks to the network, complying with national laws and internal regulations of the university under study respecting to the use of opensource software based on the National Institute of Standards and Technology
Security scheme under opensource software for accessing wireless local area networks at the university campus
Wireless networks provide flexibility, increase in productivity, and savings in infrastructure and are useful in organizations with high volume of mobile device users. The services in wireless networks require mechanisms that guarantee their efficient, secure, and reliable use. A security scheme is designed for accessing wireless local area networks (WLAN) at the campus of a Venezuelan university. The confidentiality, integrity, availability (CIA) information security principles are applied, as well as control objectives specified in ISO 27001. The proposed access security scheme mitigates threats, monitors the use of services, and establishes security parameters for reducing attacks to the network, complying with national laws and internal regulations of the university under study respecting to the use of opensource software based on the National Institute of Standards and Technolog
Editorial: El trienio 1990-1993.
Sin resumen
- …