keyword
MENU ▼
Read by QxMD icon Read
search

Internet victim

keyword
https://www.readbyqxmd.com/read/28810934/does-cyberbullying-prevalence-among-adolescents-relate-with-country-socioeconomic-and-development-indicators-an-ecological-study-of-31-countries
#1
Sara Soares, Sandra Brochado, Henrique Barros, Sílvia Fraga
BACKGROUND: In addition to individual characteristics, it is also important to evaluate how the environment may influence the dynamics of cyberbullying. We aim to study the correlation between cyberbullying prevalence among adolescents and selected country-level indicators. METHODS: We used two different data sources: data from a previously published literature review, to identify information on cyberbullying prevalence across countries, and data from the World Bank databases, to extract information on country-level indicators...
August 15, 2017: Violence and Victims
https://www.readbyqxmd.com/read/28781898/suicide-by-ingestion-of-caffeine
#2
Frédéric Aknouche, Emilie Guibert, Alison Tessier, Aude Eibel, Pascal Kintz
BACKGROUND: Mr K, aged 48, was found sweating by his partner at home at 11.50 pm. He claimed to have attempted suicide. She immediately called the Emergency Unit to ask for support. At the phone, the physician on duty indicated her to give a pill of Lysanxia (prazepam) to decrease the level of stress of the victim. However, the clinical situation worsened and he was taken to the hospital at 1.00 am. At his arrival at 1.28 am he was in cardiac arrest. Despite intensive resuscitation manoeuvres, death was pronounced at 2...
2017: Egyptian journal of forensic sciences
https://www.readbyqxmd.com/read/28771645/opportunity-for-collaboration-between-radiation-injury-treatment-network-centers-and-medical-toxicology-specialists
#3
Elizabeth Davlantes, Samuel Shartar, Jennifer Venero, Alaina Steck, Amelia Langston, Ziad N Kazzi
OBJECTIVES: The Radiation Injury Treatment Network (RITN) comprises >50 centers across the United States that are poised to care for victims of a radiation emergency. The network is organized around bone marrow transplant centers because these facilities excel in both radiation medicine and the care of patients with severe bone marrow depression. A radiation emergency may cause not only irradiation from an external source but also internal contamination with radioactive material. Because medical toxicologists are trained in radiation injury management and have expertise in the management of internal contamination, RITN centers may benefit from partnerships with medical toxicology resources, which may be located at academic medical centers, hospital inpatient clinical services, outpatient clinics, or poison control centers...
August 2017: Southern Medical Journal
https://www.readbyqxmd.com/read/28766877/munchausen-by-proxy-a-qualitative-investigation-into-online-perceptions-of-medical-child-abuse
#4
Anoushka P A Anderson, Marc D Feldman, Joanne Bryce
In Munchausen by proxy (MBP) maltreatment, increasingly termed "medical child abuse" (MCA), a caregiver fabricates or induces illness in another. The perpetrator's goal for the behavior is to meet personal emotional needs by forcing unnecessary or misguided medical or psychological treatment. Generally, a mother is the perpetrator and her child is the victim. There is a serious lack of research into most aspects of MCA, and this study is the first to utilize the anonymity of an Internet forum to investigate victims' first-hand experiences of, and the public's opinions about, suspected and confirmed MCA...
August 2, 2017: Journal of Forensic Sciences
https://www.readbyqxmd.com/read/28715937/offense-processes-of-online-sexual-grooming-and-abuse-of-children-via-internet-communication-platforms
#5
Juliane A Kloess, Catherine E Hamilton-Giachritsis, Anthony R Beech
The aim of the present study was to provide an inclusive and realistic account of the offense processes of naturally occurring, sexually exploitative interactions between offenders and victims that took place via Internet communication platforms, and develop an offense process diagram of online sexual grooming and abuse. Five case series, comprising 29 transcripts of 22 interactions, were analyzed using the qualitative approach of thematic analysis. Police reports were reviewed for descriptive and case-specific information...
July 1, 2017: Sexual Abuse: a Journal of Research and Treatment
https://www.readbyqxmd.com/read/28657785/cyber-dependent-crime-victimization-the-same-risk-for-everyone
#6
Marie Christine Bergmann, Arne Dreißigacker, Bennet von Skarczinski, Gina Rosa Wollinger
The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors...
June 28, 2017: Cyberpsychology, Behavior and Social Networking
https://www.readbyqxmd.com/read/28657776/correlates-of-mono-and-dual-victims-of-cybergrooming-and-cyberbullying-evidence-from-four-countries
#7
Sebastian Wachs, Helen C Whittle, Catherine Hamilton-Giachritsis, Karsten D Wolf, Alexander T Vazsonyi, Marianne Junger
Today's adolescents grow up using information and communication technologies as an integral part of their everyday life. This affords them with extensive opportunities, but also exposes them to online risks, such as cybergrooming and cyberbullying victimization. The aims of this study were to investigate correlates of cybergrooming and cyberbullying victimization and examine whether victims of both cybergrooming and cyberbullying (dual-cybervictims) show higher involvement in compulsive Internet use (CIU) and troubled offline behavior (TOB) compared to victims of either cybergrooming or cyberbullying (mono-cybervictims)...
June 28, 2017: Cyberpsychology, Behavior and Social Networking
https://www.readbyqxmd.com/read/28599118/sensory-metrics-of-neuromechanical-trust
#8
William Softky, Criscillia Benford
Today digital sources supply a historically unprecedented component of human sensorimotor data, the consumption of which is correlated with poorly understood maladies such as Internet addiction disorder and Internet gaming disorder. Because both natural and digital sensorimotor data share common mathematical descriptions, one can quantify our informational sensorimotor needs using the signal processing metrics of entropy, noise, dimensionality, continuity, latency, and bandwidth. Such metrics describe in neutral terms the informational diet human brains require to self-calibrate, allowing individuals to maintain trusting relationships...
June 9, 2017: Neural Computation
https://www.readbyqxmd.com/read/28559870/visual-representations-of-sexual-violence-in-online-news-outlets
#9
Sandra Schwark
To study visual representations of sexual violence, photographs accompanying German Internet news articles that appeared between January 2013 and March 2015 (N = 42) were subjected to thematic analysis. Two main themes, consisting of several sub-themes, emerged from the data. The first theme was "rape myths," illustrating a stereotypical view of sexual violence. It consisted of three sub-themes: "beauty standards," referring to the fact that all women in our sample fit western beauty standards, "physical violence," as most images implied some form of physical violence, and finally "location," suggesting that rape only happens in secluded outdoor areas...
2017: Frontiers in Psychology
https://www.readbyqxmd.com/read/28539957/the-relationship-of-sexual-abuse-with-self-esteem-depression-and-problematic-internet-use-in-korean-adolescents
#10
Bung-Nyun Kim, Subin Park, Min-Hyeon Park
The association of sexual victimization with self-esteem, depression, and problematic internet use was examined in Korean adolescents. A total of 695 middle and high school students were recruited (413 boys, 282 girls, mean age, 14.06±1.37 years). The participants were administered the Early Trauma Inventory Self Report-Short Form (ETISR-SF), Rosenberg's Self-Esteem Scale (RSES), the Children's Depression Inventory (CDI), and Young's Internet Addiction Test (IAT). The associations between sexual abuse and the level of self-esteem, depressive symptoms, and problematic internet use were analyzed...
May 2017: Psychiatry Investigation
https://www.readbyqxmd.com/read/28514981/essential-lessons-in-a-potential-sarin-attack-disaster-plan-for-a-resource-constrained-environment
#11
Matthew John Watermeyer, Nicole Dippenaar, Nelly Clotildea Tchouambou Simo, Sean Buchanan, Abdullah Ebrahim Laher
Sarin is a potent nerve agent chemical weapon that was originally designed for military purposes as a fast-acting anti-personnel weapon that would kill or disable large numbers of enemy troops. Its potent toxicity, ease of deployment, and rapid degradation allow for rapid deployment by an attacking force, who can safely enter the area of deployment a short while after its release. Sarin has been produced and stockpiled by a number of countries, and large quantities of it still exist despite collective agreements to cease manufacture and destroy stockpiles...
May 18, 2017: Disaster Medicine and Public Health Preparedness
https://www.readbyqxmd.com/read/28432846/pathological-internet-use-cyberbullying-and-mobile-phone-use-in-adolescence-a-school-based-study-in-greece
#12
Zoi Tsimtsiou, Anna-Bettina Haidich, Anastasios Drontsos, Fotini Dantsi, Zafiria Sekeri, Evangelos Drosos, Nikolaos Trikilis, Theodoros Dardavesis, Panagiotis Nanos, Malamatenia Arvanitidou
Purpose This study investigated the prevalence of Internet addiction (IA) and cyberbullying and examined profiles of adolescents with increased risk to develop pathological behaviors. Methods In this cross-sectional, school-based study, 8053 students of 30 middle and 21 high schools (12-18 years old) were invited to participate, based on a multistage stratified random sampling technique. The Internet aiddiction test (IAT) was used along with information on socio-demographics, Internet activities and cyberbullying experience...
April 22, 2017: International Journal of Adolescent Medicine and Health
https://www.readbyqxmd.com/read/28399089/-the-topical-problems-of-the-application-of-the-taser-electroshock-devices
#13
REVIEW
I V Kondratova, K Yu Kulinkovich
The objective of the present study was the analysis of publications in the foreign medical literature concerning the problems of safety, clinical diagnostics, pathological morphology, and treatment of the patients subjected to the impact by various models of the TASER electroshock devices. The materials for this article were borrowed from the available Internet resources and libraries. The methods of scientific analysis were employed to follow up the dynamics of publication and to determine the number of publications on the issues of interest...
2017: Sudebno-meditsinskaia Ekspertiza
https://www.readbyqxmd.com/read/28397175/detecting-hijacked-journals-by-using-classification-algorithms
#14
Mona Andoohgin Shahri, Mohammad Davarpanah Jazi, Glenn Borchardt, Mehdi Dadkhah
Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal...
April 10, 2017: Science and Engineering Ethics
https://www.readbyqxmd.com/read/28395194/neuroticism-as-a-risk-factor-for-child-abuse-in-victims-of-childhood-sexual-abuse
#15
Coralie Boillat, Nathalie Schwab, Matthias Stutz, Marlon O Pflueger, Marc Graf, Timm Rosburg
Findings on the relationship of experienced sexual abuse and abuse behavior in adulthood are ambiguous. However, associations between experienced abuse and neuroticism as well as between neuroticism and active child abuse have been reported repeatedly. In our study, we compared pedosexual child abusers with consumers of internet child pornography and control subjects with adult-sexual preference with regard to traumatic childhood experience (Childhood Trauma Questionnaire, CTQ), personality traits (NEO - Personality Inventory - Revised, NEO-PI-R), and sexual abnormalities (Multiphasic Sex Inventory, MSI)...
June 2017: Child Abuse & Neglect
https://www.readbyqxmd.com/read/28148338/psychological-correlates-of-civilian-preparedness-for-conflicts
#16
Moran Bodas, Maya Siman-Tov, Shulamith Kreitler, Kobi Peleg
OBJECTIVES: Preparedness for emergencies and disasters is imperative for public resilience. Previous studies have revealed low levels of civilian preparedness for conflicts. Classic behavioral models prove inapt in describing preparedness patterns in victimized populations chronically exposed to this threat. In an effort to expand this perspective, we hypothesized that other psychological constructs are correlated with preparedness. METHODS: A cross-sectional, Internet-based study was performed in Israel in early 2016...
August 2017: Disaster Medicine and Public Health Preparedness
https://www.readbyqxmd.com/read/28080133/associations-between-internet-attachment-cyber-victimization-and-internalizing-symptoms-among-adolescents
#17
Brett Holfeld, Paweena Sukhawathanakul
With increasing frequency of Internet use among adolescents, there are growing concerns about their risk for becoming attached to these forms of communication and increased vulnerability for negative online experiences, including cyber victimization. The effect of these experiences on adolescent mental health is not well understood. In this study, we examine how Internet attachment is related to anxiety and depression and assess the mediating effect of cyber victimization on these associations. Participants included 1,151 middle school students (51...
February 2017: Cyberpsychology, Behavior and Social Networking
https://www.readbyqxmd.com/read/27931891/a-systematic-review-of-anxiety-prevalence-in-adults-within-primary-care-and-community-settings-in-malaysia
#18
REVIEW
Chin Hoong Wong, Zia U Bakt Sultan Shah, Cheong Lieng Teng, Tzi Quen Lin, Zainab Abdul Majeed, Chun Wai Chan
BACKGROUND: Anxiety disorders are common mental health disorders with significant impact on the individual as well as burden on the country as a whole. METHODS: A systematic review of databases, reference lists, internet sources, and input from content experts revealed 42 studies that documented the prevalence of anxiety symptoms or disorders. 12 of these studies specifically evaluated anxiety disorders. RESULTS: 4 studies looked at the prevalence of anxiety disorders in the general population, whilst the remainder focused on selected population groups: university students (4 studies); substance abuse (3 studies); and victims of abuse (1 study)...
December 2016: Asian Journal of Psychiatry
https://www.readbyqxmd.com/read/27831829/dynamic-change-of-aggressive-behavior-and-victimization-among-adolescents-effectiveness-of-the-visc-program
#19
Takuya Yanagida, Dagmar Strohmeier, Christiane Spiel
The present study reports a high-quality evaluation of the ViSC Social Competence Program, which was implemented large scale in Austria. A rigorous test of program effectiveness has been performed to investigate the dynamic change of aggressive behavior and victimization and to ensure a high level of statistical conclusion validity. A cluster randomized control study was applied to examine program effectiveness regarding aggressive behavior and victimization. In sum, 1,377 adolescents (48.5% girls, Mage = 11...
November 10, 2016: Journal of Clinical Child and Adolescent Psychology
https://www.readbyqxmd.com/read/27827931/a-methodological-approach-for-assessing-amplified-reflection-distributed-denial-of-service-on-the-internet-of-things
#20
João José Costa Gondim, Robson de Oliveira Albuquerque, Anderson Clayton Alves Nascimento, Luis Javier García Villalba, Tai-Hoon Kim
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT...
November 4, 2016: Sensors
keyword
keyword
112741
1
2
Fetch more papers »
Fetching more papers... Fetching...
Read by QxMD. Sign in or create an account to discover new knowledge that matter to you.
Remove bar
Read by QxMD icon Read
×

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"