339 resultados para Sexual Problems
Resumo:
Introduction and Aim: Sexual assaults commonly involve alcohol use by the perpetrator, victim, or both. Beliefs about alcohol’s effects may impact on people’s perceptions of and responses to men and women who have had such experiences while intoxicated from alcohol. This study aimed to develop an alcohol expectancy scale that captures young adults’ beliefs about alcohol’s role in sexual aggression and victimisation. Design and Methods: Based on pilot focus groups, an initial pool of 135 alcohol expectancy items was developed, checked for readability and face validity, and administered via a cross-sectional survey to 201 male and female university students (18-25 years). Items were specified in terms of three target drinkers: self, men, and women. In addition, a social desirability measure was included. Results: Principal Axis Factoring revealed a 4-factor solution for the targets men and women and a 5-factor solution for the target self with 72 items retained. Factors related to sexual coercion, sexual vulnerability, confidence, self-centredness, and negative cognitive and behavioural effects. Social desirability issues were evident for the target self, but not for the targets men and women. Discussion and Conclusions: Young adults link alcohol’s effects with sexual vulnerabilities via perceived risky cognitions and behaviours. Due to social desirability, these expectancies may be difficult to explicate for the self but may be accessible instead via other-oriented assessment. The Sexual Coercion and Vulnerability Alcohol Expectancy Scale has potential as a tool to elucidate the established tendency for observers to excuse intoxicated sexual perpetrators while blaming intoxicated victims.
Resumo:
This paper considers two problems that frequently arise in dynamic discrete choice problems but have not received much attention with regard to simulation methods. The first problem is how to simulate unbiased simulators of probabilities conditional on past history. The second is simulating a discrete transition probability model when the underlying dependent variable is really continuous. Both methods work well relative to reasonable alternatives in the application discussed. However, in both cases, for this application, simpler methods also provide reasonably good results.
Resumo:
Following the derivation of amplitude equations through a new two-time-scale method [O'Malley, R. E., Jr. & Kirkinis, E (2010) A combined renormalization group-multiple scale method for singularly perturbed problems. Stud. Appl. Math. 124, 383-410], we show that a multi-scale method may often be preferable for solving singularly perturbed problems than the method of matched asymptotic expansions. We illustrate this approach with 10 singularly perturbed ordinary and partial differential equations. © 2011 Cambridge University Press.
Resumo:
This paper introduces a straightforward method to asymptotically solve a variety of initial and boundary value problems for singularly perturbed ordinary differential equations whose solution structure can be anticipated. The approach is simpler than conventional methods, including those based on asymptotic matching or on eliminating secular terms. © 2010 by the Massachusetts Institute of Technology.
Resumo:
In this paper we introduce a new technique to obtain the slow-motion dynamics in nonequilibrium and singularly perturbed problems characterized by multiple scales. Our method is based on a straightforward asymptotic reduction of the order of the governing differential equation and leads to amplitude equations that describe the slowly-varying envelope variation of a uniformly valid asymptotic expansion. This may constitute a simpler and in certain cases a more general approach toward the derivation of asymptotic expansions, compared to other mainstream methods such as the method of Multiple Scales or Matched Asymptotic expansions because of its relation with the Renormalization Group. We illustrate our method with a number of singularly perturbed problems for ordinary and partial differential equations and recover certain results from the literature as special cases. © 2010 - IOS Press and the authors. All rights reserved.
Resumo:
The series expansion of the plasma fields and currents in vector spherical harmonics has been demonstrated to be an efficient technique for solution of nonlinear problems in spherically bounded plasmas. Using this technique, it is possible to describe the nonlinear plasma response to the rotating high-frequency magnetic field applied to the magnetically confined plasma sphere. The effect of the external magnetic field on the current drive and field configuration is studied. The results obtained are important for continuous current drive experiments in compact toruses. © 2000 American Institute of Physics.
Resumo:
Design Science is the process of solving ‘wicked problems’ through designing, developing, instantiating, and evaluating novel solutions (Hevner, March, Park and Ram, 2004). Wicked problems are described as agent finitude in combination with problem complexity and normative constraint (Farrell and Hooker, 2013). In Information Systems Design Science, determining that problems are ‘wicked’ differentiates Design Science research from Solutions Engineering (Winter, 2008) and is a necessary part of proving the relevance to Information Systems Design Science research (Hevner, 2007; Iivari, 2007). Problem complexity is characterised as many problem components with nested, dependent and co-dependent relationships interacting through multiple feedback and feed-forward loops. Farrell and Hooker (2013) specifically state for wicked problems “it will often be impossible to disentangle the consequences of specific actions from those of other co-occurring interactions”. This paper discusses the application of an Enterprise Information Architecture modelling technique to disentangle the wicked problem complexity for one case. It proposes that such a modelling technique can be applied to other wicked problems and can lay the foundations for proving relevancy to DSR, provide solution pathways for artefact development, and aid to substantiate those elements required to produce Design Theory.
Resumo:
This paper will report on the “wicked” problems encountered when designing an online course with bounded content in an unbounded learning environment. It will describe the dilemmas faced and decisions made by academics in an Australian university challenged by an institutional initiative to design radical, disruptive learning experiences making use of readily available online media. This bounded/unbounded environment demands new roles for instructors in adopting innovative pedagogies and teaching and learning strategies. It also creates changing and challenging roles for course designers as they deal with ill-defined parameters and unknown audiences. In this paper, we propose a novel methodology for making curricular decisions in ill-defined spaces.
Resumo:
Two important books on the topic of child sexual abuse prevention were recently published: Off Limits: A Parent’s Guide to Keeping Kids Safe from Sexual Abuse (Wurtele & Berkower, 2010) and Smart Parenting for Safer Kids (Briggs, 2010). The authors of both books are highly credentialed with long experience researching and writing about child sexual abuse prevention. Sandy Wurtele, PhD, is author of landmark child- and parent-focused sexual abuse prevention programs conducted in the USA over the past 30 years. She has published over 80 journal articles and book chapters on this topic. Her co-author, Feather Berkower, MSW, has been conducting workshops for adults on this topic for 25 years. Freda Briggs, PhD, has over 40 years’ experience in child protection in Australia and has also published numerous scholarly works on the topic. She was the inaugural recipient of the Australian Humanitarian Award in 1998, was Senior Australian of the Year in 2000, and was awarded an Order of Australia in 2005.
Resumo:
Mandatory reporting laws have been created in many jurisdictions as a way of identifying cases of severe child maltreatment on the basis that cases will otherwise remain hidden. These laws usually apply to all four maltreatment types. Other jurisdictions have narrower approaches supplemented by differential response systems, and others still have chosen not to enact mandatory reporting laws for any type of maltreatment. In scholarly research and normative debates about mandatory reporting laws and their effects, the four major forms of child maltreatment—physical abuse, sexual abuse, emotional abuse, and neglect—are often grouped together as if they are homogenous in nature, cause, and consequence. Yet, the heterogeneity of maltreatment types, and different reporting practices regarding them, must be acknowledged and explored when considering what legal and policy frameworks are best suited to identify and respond to cases. A related question which is often conjectured upon but seldom empirically explored, is whether reporting laws make a difference in case identification. This article first considers different types of child abuse and neglect, before exploring the nature and operation of mandatory reporting laws in different contexts. It then posits a differentiation thesis, arguing that different patterns of reporting between both reporter groups and maltreatment types must be acknowledged and analysed, and should inform discussions and assessments of optimal approaches in law, policy and practice. Finally, to contribute to the evidence base required to inform discussion, this article conducts an empirical cross-jurisdictional comparison of the reporting and identification of child sexual abuse in jurisdictions with and withoutmandatory reporting, and concludes that mandatory reporting laws appear to be associated with better case identification.
Resumo:
Determining the condition as well as the remaining life of an insulation system is essential for the reliable operation of large oil-filled power transformers. Frequency-domain spectroscopy (FDS) is one of the diagnostic techniques used to identify the dielectric status of a transformer. Currently, this technique can only be implemented on a de-energized transformer. This paper presents an initial investigation into a novel online monitoring method based on FDS dielectric measurements for transformers. The proposed technique specifically aims to address the real operational constraints of online testing. This is achieved by designing an online testing model extending the basic “extended Debye” linear dielectric model and taking unique noise issues only experienced during online measurements into account via simulations. Approaches to signal denoising and potential problems expected to be encountered during online measurements will also be discussed. Using fixed-frequency sinusoidal excitation waveforms will result in a long measurement times. The use of alternatives such as a chirp has been investigated using simulations. The results presented in the paper predict that reliable measurements should be possible during online testing.
Resumo:
This study extends previous research into social networking sites (SNSs) as environments that often reduce spatial, temporal, and social boundaries, which can result in collapsed contexts for social situations. Context collapse was investigated through interviews and Facebook walkthroughs with 27 LGBTQ young people in the United Kingdom. Since diverse sexualities are often stigmatized, participants’ sexual identity disclosure decisions were shaped by both the social conditions of their online networks and the technological architecture of SNSs. Context collapse was experienced as an event through which individuals intentionally redefined their sexual identity across audiences or managed unintentional disclosure. To prevent unintentional context collapse, participants frequently reinstated contexts through tailored performances and audience separation. These findings provide insight into stigmatized identity performances in networked publics while situating context collapse within a broader understanding of impression management, which paves the way for future research exploring the identity implications of everyday SNS use.