keyword
MENU ▼
Read by QxMD icon Read
search

Internet victim

keyword
https://www.readbyqxmd.com/read/29095040/prevalence-and-risk-factors-among-minors-for-online-sexual-solicitations-and-interactions-with-adults
#1
Patricia de Santisteban, Manuel Gámez-Guadix
The research on online child sexual victimization has mainly focused on the sexual solicitation of minors (i.e., sexual requests by an adult), with scarce information available on sexual interactions (e.g., cybersex or meeting in person) in which a minor is exploited by an adult. In the present study, we analyzed the prevalence and risk factors associated with both sexual solicitations and interactions of minors with adults. The sample included 2,731 minors between 12 and 15 years old (50.6% female). The minors completed several self-report questionnaires about sexual solicitations and interactions with adults, including possible risk factors (e...
November 2, 2017: Journal of Sex Research
https://www.readbyqxmd.com/read/29061413/aggression-in-schools-cyberbullying-and-gender-issues
#2
Drishti Sharma, Jugal Kishore, Nandini Sharma, Mona Duggal
Due to increasing internet and mobile penetration, children in India are at risk of cyberbullying. A survey of 174 middle graders in Delhi showed that, of total, 8% indulged in cyberbullying and 17% reported being victimized by such acts. However, prevalence of in-person bullying, fighting and victimization by either was 16%, 12% and 17% respectively. Males were more likely to bully and fight in-person than females. They were also more likely to be victims of both online and offline aggression. Interwoven modes of bullying along with safe use of technology need to be understood...
October 2017: Asian Journal of Psychiatry
https://www.readbyqxmd.com/read/29048938/cybercrime-victimization-and-subjective-well-being-an-examination-of-the-buffering-effect-hypothesis-among-adolescents-and-young-adults
#3
Markus Kaakinen, Teo Keipi, Pekka Räsänen, Atte Oksanen
The wealth of beneficial tools for online interaction, consumption, and access to others also bring new risks for harmful experiences online. This study examines the association between cybercrime victimization and subjective well-being (SWB) and, based on the buffering effect hypothesis, tests the assumption of the protective function of social belonging in cybercrime victimization. Cross-national data from the United States, United Kingdom, Germany, and Finland (N = 3,557; Internet users aged 15-30 years; 49...
October 19, 2017: Cyberpsychology, Behavior and Social Networking
https://www.readbyqxmd.com/read/29036900/toward-a-robust-security-paradigm-for-bluetooth-low-energy-based-smart-objects-in-the-internet-of-things
#4
Shi-Cho Cha, Kuo-Hui Yeh, Jyun-Fu Chen
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique...
October 14, 2017: Sensors
https://www.readbyqxmd.com/read/28981466/negative-peer-relationships-on-piracy-behavior-a-cross-sectional-study-of-the-associations-between-cyberbullying-involvement-and-digital-piracy
#5
Santiago Yubero, Elisa Larrañaga, Beatriz Villora, Raúl Navarro
The present study examines the relationship between different roles in cyberbullying behaviors (cyberbullies, cybervictims, cyberbullies-victims, and uninvolved) and self-reported digital piracy. In a region of central Spain, 643 (49.3% females, 50.7% males) students (grades 7-10) completed a number of self-reported measures, including cyberbullying victimization and perpetration, self-reported digital piracy, ethical considerations of digital piracy, time spent on the Internet, and leisure activities related with digital content...
October 5, 2017: International Journal of Environmental Research and Public Health
https://www.readbyqxmd.com/read/28975231/death-and-cardiac-arrest-in-u-s-triathlon-participants-1985-to-2016-a-case-series
#6
Kevin M Harris, Lawrence L Creswell, Tammy S Haas, Taylor Thomas, Monica Tung, Erin Isaacson, Ross F Garberich, Barry J Maron
Background: Reports of race-related triathlon fatalities have raised questions regarding athlete safety. Objective: To describe death and cardiac arrest among triathlon participants. Design: Case series. Setting: United States. Participants: Participants in U.S. triathlon races from 1985 to 2016. Measurements: Data on deaths and cardiac arrests were assembled from such sources as the U...
October 17, 2017: Annals of Internal Medicine
https://www.readbyqxmd.com/read/28810934/does-cyberbullying-prevalence-among-adolescents-relate-with-country-socioeconomic-and-development-indicators-an-ecological-study-of-31-countries
#7
Sara Soares, Sandra Brochado, Henrique Barros, Sílvia Fraga
BACKGROUND: In addition to individual characteristics, it is also important to evaluate how the environment may influence the dynamics of cyberbullying. We aim to study the correlation between cyberbullying prevalence among adolescents and selected country-level indicators. METHODS: We used two different data sources: data from a previously published literature review, to identify information on cyberbullying prevalence across countries, and data from the World Bank databases, to extract information on country-level indicators...
October 1, 2017: Violence and Victims
https://www.readbyqxmd.com/read/28781898/suicide-by-ingestion-of-caffeine
#8
Frédéric Aknouche, Emilie Guibert, Alison Tessier, Aude Eibel, Pascal Kintz
BACKGROUND: Mr K, aged 48, was found sweating by his partner at home at 11.50 pm. He claimed to have attempted suicide. She immediately called the Emergency Unit to ask for support. At the phone, the physician on duty indicated her to give a pill of Lysanxia (prazepam) to decrease the level of stress of the victim. However, the clinical situation worsened and he was taken to the hospital at 1.00 am. At his arrival at 1.28 am he was in cardiac arrest. Despite intensive resuscitation manoeuvres, death was pronounced at 2...
2017: Egyptian Journal of Forensic Sciences
https://www.readbyqxmd.com/read/28771645/opportunity-for-collaboration-between-radiation-injury-treatment-network-centers-and-medical-toxicology-specialists
#9
Elizabeth Davlantes, Samuel Shartar, Jennifer Venero, Alaina Steck, Amelia Langston, Ziad N Kazzi
OBJECTIVES: The Radiation Injury Treatment Network (RITN) comprises >50 centers across the United States that are poised to care for victims of a radiation emergency. The network is organized around bone marrow transplant centers because these facilities excel in both radiation medicine and the care of patients with severe bone marrow depression. A radiation emergency may cause not only irradiation from an external source but also internal contamination with radioactive material. Because medical toxicologists are trained in radiation injury management and have expertise in the management of internal contamination, RITN centers may benefit from partnerships with medical toxicology resources, which may be located at academic medical centers, hospital inpatient clinical services, outpatient clinics, or poison control centers...
August 2017: Southern Medical Journal
https://www.readbyqxmd.com/read/28766877/munchausen-by-proxy-a-qualitative-investigation-into-online-perceptions-of-medical-child-abuse
#10
Anoushka P A Anderson, Marc D Feldman, Joanne Bryce
In Munchausen by proxy (MBP) maltreatment, increasingly termed "medical child abuse" (MCA), a caregiver fabricates or induces illness in another. The perpetrator's goal for the behavior is to meet personal emotional needs by forcing unnecessary or misguided medical or psychological treatment. Generally, a mother is the perpetrator and her child is the victim. There is a serious lack of research into most aspects of MCA, and this study is the first to utilize the anonymity of an Internet forum to investigate victims' first-hand experiences of, and the public's opinions about, suspected and confirmed MCA...
August 2, 2017: Journal of Forensic Sciences
https://www.readbyqxmd.com/read/28715937/offense-processes-of-online-sexual-grooming-and-abuse-of-children-via-internet-communication-platforms
#11
Juliane A Kloess, Catherine E Hamilton-Giachritsis, Anthony R Beech
The aim of the present study was to provide an inclusive and realistic account of the offense processes of naturally occurring, sexually exploitative interactions between offenders and victims that took place via Internet communication platforms, and develop an offense process diagram of online sexual grooming and abuse. Five case series, comprising 29 transcripts of 22 interactions, were analyzed using the qualitative approach of thematic analysis. Police reports were reviewed for descriptive and case-specific information...
July 1, 2017: Sexual Abuse: a Journal of Research and Treatment
https://www.readbyqxmd.com/read/28657785/cyber-dependent-crime-victimization-the-same-risk-for-everyone
#12
Marie Christine Bergmann, Arne Dreißigacker, Bennet von Skarczinski, Gina Rosa Wollinger
The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors...
June 28, 2017: Cyberpsychology, Behavior and Social Networking
https://www.readbyqxmd.com/read/28657776/correlates-of-mono-and-dual-victims-of-cybergrooming-and-cyberbullying-evidence-from-four-countries
#13
Sebastian Wachs, Helen C Whittle, Catherine Hamilton-Giachritsis, Karsten D Wolf, Alexander T Vazsonyi, Marianne Junger
Today's adolescents grow up using information and communication technologies as an integral part of their everyday life. This affords them with extensive opportunities, but also exposes them to online risks, such as cybergrooming and cyberbullying victimization. The aims of this study were to investigate correlates of cybergrooming and cyberbullying victimization and examine whether victims of both cybergrooming and cyberbullying (dual-cybervictims) show higher involvement in compulsive Internet use (CIU) and troubled offline behavior (TOB) compared to victims of either cybergrooming or cyberbullying (mono-cybervictims)...
June 28, 2017: Cyberpsychology, Behavior and Social Networking
https://www.readbyqxmd.com/read/28599118/sensory-metrics-of-neuromechanical-trust
#14
William Softky, Criscillia Benford
Today digital sources supply a historically unprecedented component of human sensorimotor data, the consumption of which is correlated with poorly understood maladies such as Internet addiction disorder and Internet gaming disorder. Because both natural and digital sensorimotor data share common mathematical descriptions, one can quantify our informational sensorimotor needs using the signal processing metrics of entropy, noise, dimensionality, continuity, latency, and bandwidth. Such metrics describe in neutral terms the informational diet human brains require to self-calibrate, allowing individuals to maintain trusting relationships...
September 2017: Neural Computation
https://www.readbyqxmd.com/read/28559870/visual-representations-of-sexual-violence-in-online-news-outlets
#15
Sandra Schwark
To study visual representations of sexual violence, photographs accompanying German Internet news articles that appeared between January 2013 and March 2015 (N = 42) were subjected to thematic analysis. Two main themes, consisting of several sub-themes, emerged from the data. The first theme was "rape myths," illustrating a stereotypical view of sexual violence. It consisted of three sub-themes: "beauty standards," referring to the fact that all women in our sample fit western beauty standards, "physical violence," as most images implied some form of physical violence, and finally "location," suggesting that rape only happens in secluded outdoor areas...
2017: Frontiers in Psychology
https://www.readbyqxmd.com/read/28539957/the-relationship-of-sexual-abuse-with-self-esteem-depression-and-problematic-internet-use-in-korean-adolescents
#16
Bung-Nyun Kim, Subin Park, Min-Hyeon Park
The association of sexual victimization with self-esteem, depression, and problematic internet use was examined in Korean adolescents. A total of 695 middle and high school students were recruited (413 boys, 282 girls, mean age, 14.06±1.37 years). The participants were administered the Early Trauma Inventory Self Report-Short Form (ETISR-SF), Rosenberg's Self-Esteem Scale (RSES), the Children's Depression Inventory (CDI), and Young's Internet Addiction Test (IAT). The associations between sexual abuse and the level of self-esteem, depressive symptoms, and problematic internet use were analyzed...
May 2017: Psychiatry Investigation
https://www.readbyqxmd.com/read/28514981/essential-lessons-in-a-potential-sarin-attack-disaster-plan-for-a-resource-constrained-environment
#17
Matthew John Watermeyer, Nicole Dippenaar, Nelly Clotildea Tchouambou Simo, Sean Buchanan, Abdullah Ebrahim Laher
Sarin is a potent nerve agent chemical weapon that was originally designed for military purposes as a fast-acting anti-personnel weapon that would kill or disable large numbers of enemy troops. Its potent toxicity, ease of deployment, and rapid degradation allow for rapid deployment by an attacking force, who can safely enter the area of deployment a short while after its release. Sarin has been produced and stockpiled by a number of countries, and large quantities of it still exist despite collective agreements to cease manufacture and destroy stockpiles...
May 18, 2017: Disaster Medicine and Public Health Preparedness
https://www.readbyqxmd.com/read/28432846/pathological-internet-use-cyberbullying-and-mobile-phone-use-in-adolescence-a-school-based-study-in-greece
#18
Zoi Tsimtsiou, Anna-Bettina Haidich, Anastasios Drontsos, Fotini Dantsi, Zafiria Sekeri, Evangelos Drosos, Nikolaos Trikilis, Theodoros Dardavesis, Panagiotis Nanos, Malamatenia Arvanitidou
Purpose This study investigated the prevalence of Internet addiction (IA) and cyberbullying and examined profiles of adolescents with increased risk to develop pathological behaviors. Methods In this cross-sectional, school-based study, 8053 students of 30 middle and 21 high schools (12-18 years old) were invited to participate, based on a multistage stratified random sampling technique. The Internet aiddiction test (IAT) was used along with information on socio-demographics, Internet activities and cyberbullying experience...
April 22, 2017: International Journal of Adolescent Medicine and Health
https://www.readbyqxmd.com/read/28399089/-the-topical-problems-of-the-application-of-the-taser-electroshock-devices
#19
REVIEW
I V Kondratova, K Yu Kulinkovich
The objective of the present study was the analysis of publications in the foreign medical literature concerning the problems of safety, clinical diagnostics, pathological morphology, and treatment of the patients subjected to the impact by various models of the TASER electroshock devices. The materials for this article were borrowed from the available Internet resources and libraries. The methods of scientific analysis were employed to follow up the dynamics of publication and to determine the number of publications on the issues of interest...
2017: Sudebno-meditsinskaia Ekspertiza
https://www.readbyqxmd.com/read/28397175/detecting-hijacked-journals-by-using-classification-algorithms
#20
Mona Andoohgin Shahri, Mohammad Davarpanah Jazi, Glenn Borchardt, Mehdi Dadkhah
Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal...
April 10, 2017: Science and Engineering Ethics
keyword
keyword
112741
1
2
Fetch more papers »
Fetching more papers... Fetching...
Read by QxMD. Sign in or create an account to discover new knowledge that matter to you.
Remove bar
Read by QxMD icon Read
×

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"