444 research outputs found

    Self-Reported Memory for Abuse Depends Upon Victim-Perpetrator Relationship

    Get PDF
    Article copies available for a fee from The Haworth Document Delivery Service: 1-800-342-9678. E-mail address: Website: (c) 2001 by The Haworth Press, Inc. All rights reserved.We present preliminary results from the Betrayal Trauma Inventory (BTI) testing predictions from betrayal trauma theory (Freyd, 1994, 1996, in press) about the relationship between amnesia and betrayal by a caregiver. The BTI assesses trauma history using behaviorally defined events in the domains of sexual, physical, and emotional childhood abuse, as well as other lifetime traumatic events. When participants endorse an abuse experience, follow-up questions assess a variety of factors including memory impairment and perpetrator relationship. Preliminary results support our prediction that abuse perpetrated by a caregiver is related to less persistent memories of abuse. This relationship is significant for sexual and physical abuse. Regression analyses revealed that age was not a significant predictor of memory impairment and that duration of abuse could not account for the findings

    Four problems regarding representable functors

    Full text link
    Let RR, SS be two rings, CC an RR-coring and RCM{}_{R}^C{\mathcal M} the category of left CC-comodules. The category Rep(RCM,SM){\bf Rep}\, ( {}_{R}^C{\mathcal M}, {}_{S}{\mathcal M} ) of all representable functors RCMSM{}_{R}^C{\mathcal M} \to {}_{S}{\mathcal M} is shown to be equivalent to the opposite of the category RCMS{}_{R}^C{\mathcal M}_S. For UU an (S,R)(S,R)-bimodule we give necessary and sufficient conditions for the induction functor UR:RCMSMU\otimes_R - : {}_{R}^C\mathcal{M} \to {}_{S}\mathcal{M} to be: a representable functor, an equivalence of categories, a separable or a Frobenius functor. The latter results generalize and unify the classical theorems of Morita for categories of modules over rings and the more recent theorems obtained by Brezinski, Caenepeel et al. for categories of comodules over corings.Comment: 16 pages, the second versio

    2-Vector Spaces and Groupoids

    Full text link
    This paper describes a relationship between essentially finite groupoids and 2-vector spaces. In particular, we show to construct 2-vector spaces of Vect-valued presheaves on such groupoids. We define 2-linear maps corresponding to functors between groupoids in both a covariant and contravariant way, which are ambidextrous adjoints. This is used to construct a representation--a weak functor--from Span(Gpd) (the bicategory of groupoids and spans of groupoids) into 2Vect. In this paper we prove this and give the construction in detail.Comment: 44 pages, 5 figures - v2 adds new theorem, significant changes to proofs, new sectio

    A Coboundary Morphism For The Grothendieck Spectral Sequence

    Full text link
    Given an abelian category A\mathcal{A} with enough injectives we show that a short exact sequence of chain complexes of objects in A\mathcal{A} gives rise to a short exact sequence of Cartan-Eilenberg resolutions. Using this we construct coboundary morphisms between Grothendieck spectral sequences associated to objects in a short exact sequence. We show that the coboundary preserves the filtrations associated with the spectral sequences and give an application of these result to filtrations in sheaf cohomology.Comment: 18 page

    Sound and complete axiomatizations of coalgebraic language equivalence

    Get PDF
    Coalgebras provide a uniform framework to study dynamical systems, including several types of automata. In this paper, we make use of the coalgebraic view on systems to investigate, in a uniform way, under which conditions calculi that are sound and complete with respect to behavioral equivalence can be extended to a coarser coalgebraic language equivalence, which arises from a generalised powerset construction that determinises coalgebras. We show that soundness and completeness are established by proving that expressions modulo axioms of a calculus form the rational fixpoint of the given type functor. Our main result is that the rational fixpoint of the functor FTFT, where TT is a monad describing the branching of the systems (e.g. non-determinism, weights, probability etc.), has as a quotient the rational fixpoint of the "determinised" type functor Fˉ\bar F, a lifting of FF to the category of TT-algebras. We apply our framework to the concrete example of weighted automata, for which we present a new sound and complete calculus for weighted language equivalence. As a special case, we obtain non-deterministic automata, where we recover Rabinovich's sound and complete calculus for language equivalence.Comment: Corrected version of published journal articl

    University Crime Alerts: Do They Contribute to Institutional Betrayal and Rape Myths?

    Get PDF
    Universities are mandated by the Clery Act (20 USC § 1092(f)) to publicize the occurrence of certain campus crimes. Many universities rely on “Crime Alert” emails to quickly and effectively communicate when a crime has occurred. However, communications of sexual crimes are often narrow (e.g., limited to stranger-perpetrated crimes) and misleading (e.g., containing safety tips that are not applicable to most types of sexual violence). The current paper presents the results of two studies that test the effects of reading crime alert emails on subsequent endorsement of rape myths and institutional betrayal. In Study 1, participants read a typical crime alert email describing a stranger-perpetrated crime, an alternative email describing an acquaintance-perpetrated crime, or a control email describing an event unrelated to interpersonal violence. Men were significantly more likely to endorse rape myths than were women in the control condition, but not in the typical or alternative email condition. In addition, results from Study 1 indicate that issuing crime alert emails following stranger-perpetrated sexual violence leads to a sense of institutional betrayal among students who have experienced acquaintance-perpetrated violence. In Study 2, participants read a typical crime alert email or an alternative digest email. Participants who read the typical email reported higher rape myth acceptance, but not institutional betrayal, than those who read the digest email. There were also significant gender differences in student opinions of each email that suggest the digest email format may serve as a useful tool for engaging male students in the issue of campus sexual violence. Taken together, these studies provide converging evidence that university communication regarding sexual violence can either perpetuate or positively influence attitudes towards sexual violence

    Post Quantum Cryptography from Mutant Prime Knots

    Full text link
    By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime knots and their mutants. The scheme combines an asymmetric public key protocol with symmetric private ones and is intrinsecally secure against quantum eavesdropper attacks.Comment: 14 pages, 5 figure

    Covers of acts over monoids II

    Full text link
    In 1981 Edgar Enochs conjectured that every module has a flat cover and finally proved this in 2001. Since then a great deal of effort has been spent on studying different types of covers, for example injective and torsion free covers. In 2008, Mahmoudi and Renshaw initiated the study of flat covers of acts over monoids but their definition of cover was slightly different from that of Enochs. Recently, Bailey and Renshaw produced some preliminary results on the `other' type of cover and it is this work that is extended in this paper. We consider free, divisible, torsion free and injective covers and demonstrate that in some cases the results are quite different from the module case

    Pledged into Harm: Sorority and Fraternity Members Face Increased Risk of Sexual Assault and Sexual Harassment

    Get PDF
    The purpose of this manuscript is to examine the risk of sexual exploitation (both assault and harassment) associated with sorority and fraternity membership on U.S. college campuses. The results from this study come from data collected through an online survey. Participants (N=883) at a large Pacific Northwestern university provided information related to their sorority or fraternity membership, experiences of sexual violence (i.e., assault and harassment), and alcohol use. We both replicated and extended past research. Corroborating prior research, Greek-affiliated students experienced higher rates of sexual assault than non-affiliated students. We extended past research by focusing on sexual harassment experiences within the Greek life culture. Both male and female Greek-affiliated students reported higher rates of sexual harassment particularly unwanted sexual attention, compared to their non-Greek-affiliated peers. We also found that both sorority membership and alcohol-related problems predicted unique variance in women’s exposure to nonconsensual sexual contact, attempted/completed rape, and unwanted sexual attention. Fraternity membership but not alcohol-related problems predicted unique variance in men’s exposure to nonconsensual sexual contact and unwanted sexual attention. Implications discussed include the short- and long-term consequences of Greek-affiliation, institutional betrayal, and addressing sexual exploitation within this culture. Also identified are limitations of the current study and future directions for research on sexual exploitation within Greek life
    corecore