Supportive and Unsupportive Aspects of the Behavior of Others Toward Victims of Sexual and Nonsexual Assault (original) (raw)

1996, Journal of Interpersonal Violence

https://doi.org/10.1177/088626096011002008

Sign up for access to the world's latest research

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

The Role of Persistent Identifiers in E-Science

2019

The transformations in science produced by the development of ICTs are conceptualized in the model of e-Science. Information on the researchers' activities in digital form is collected in several systems outside the affiliated institutions. Manuscript submission systems, grant funding applications, data centers, citation indexes, other institutional or disciplinary repositories and personal web pages are all important sources of information. Persistent identifiers allow to discover and collect this information and provide the ability to compare, analyze and combine data with greater efficiency and accuracy. The article provides an overview of the most popular persistent identifiers used in e-Science and describes their role.

Deliverable 4.4 Organizational IDs in Practice

2020

This deliverable demonstrates how the various partners in FREYA are taking up persistent identifiers for organizations as part of the Work Package 4 work on integrating emerging PID types into disciplinary contexts. A range of organization IDs are discussed with special focus on the ROR ID as a community-led initiative with open infrastructure and data that is well suited for use in an open science environment.

Userscripts for the Life Sciences

BMC Bioinformatics, 2007

The web has seen an explosion of chemistry and biology related resources in the last 15 years: thousands of scientific journals, databases, wikis, blogs and resources are available with a wide variety of types of information. There is a huge need to aggregate and organise this information. However, the sheer number of resources makes it unrealistic to link them all in a centralised manner. Instead, search engines to find information in those resources flourish, and formal languages like Resource Description Framework and Web Ontology Language are increasingly used to allow linking of resources. A recent development is the use of userscripts to change the appearance of web pages, by on-the-fly modification of the web content. This opens possibilities to aggregate information and computational results from different web resources into the web page of one of those resources.

IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks

Journal of Computer Networks and Communications, 2016

Ad hoc networks lack support of infrastructure and operate in a shared bandwidth wireless environment. Presently, such networks have been realized by various adaptations in Internet Protocol (IP) architecture which was developed for infrastructure oriented hierarchical networks. The IP architecture has its known problem and issues even in infrastructure settings, like IP address overloading, mobility, multihoming, and so forth. Therefore, when such architecture is implemented in ad hoc scenario the problems get multiplied. Due to this fact, ad hoc networks suffer from additional problems like IP address autoconfiguration, service provisioning, efficient bandwidth utilization, and node identification. In this paper we present IDHOCNET which is a novel implementation of service provisioning and application development framework in the ad hoc context. We illustrate a number of implemented features of the architecture which include IP address autoconfiguration, identification of nodes b...

Requirements on unique identifiers for managing product lifecycle information: comparison of alternative approaches

International Journal of …, 2007

Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. The main difficulty is to maintain a communication link between the product item and its associated information as the product item moves over organizational borders and between different users. As network access will typically not be continuous during the whole product-item lifecycle, it is necessary to embed at least a globally unique product identifier (GUPI) that makes it possible to identify the product item anytime during its lifecycle. A GUPI also has to provide a linking mechanism to product information that may be stored in backend systems of different organizations. GUPIs are thereby a cornerstone for enabling the Internet of Things, where 'intelligent products' can communicate over the Internet. In this paper, we analyze and compare the three main currently known approaches for achieving such functionality, i.e. the EPC Network, DIALOG and WWAI.

Deliverable 4.1 Integration of Mature PID Types

2018

This deliverable reports on the deployment of PID Graph functionality in FREYA's pilot applications. Initial steps for building the PID Graph include advancing the implementation of person-article-data linking, further establishing software citation and publication workflows, and integrating mature PID types into the different disciplinary systems. This first report for Work Package 4 presents considerations and implementations stemming from the first year of work carried out by the pilot applications and sets the scene for the future integration of new and emerging PID types.

Deliverable 4.6 Emerging and New PID Graph Resource Types in Disciplinary Contexts

2021

This deliverable focuses on the integrations of emerging PID resource types made by the disciplinary partners in FREYA, including organization IDs, grant and funder IDs. It summarizes lessons learned of use to communities wishing to undertake similar implementations. A status update is provided for PID resource types identified as emerging or immature at the outset of the project that have been moved forward since then.

NLM-Chem, a new resource for chemical entity recognition in PubMed full text literature

Scientific Data, 2021

Automatically identifying chemical and drug names in scientific publications advances information access for this important class of entities in a variety of biomedical disciplines by enabling improved retrieval and linkage to related concepts. While current methods for tagging chemical entities were developed for the article title and abstract, their performance in the full article text is substantially lower. However, the full text frequently contains more detailed chemical information, such as the properties of chemical compounds, their biological effects and interactions with diseases, genes and other chemicals. We therefore present the NLM-Chem corpus, a full-text resource to support the development and evaluation of automated chemical entity taggers. the NLM-Chem corpus consists of 150 full-text articles, doubly annotated by ten expert NLM indexers, with ~5000 unique chemical name annotations, mapped to ~2000 MeSH identifiers. We also describe a substantially improved chemical entity tagger, with automated annotations for all of PubMed and PMC freely accessible through the Pubtator web-based interface and aPI. the NLM-Chem corpus is freely available.

User Facilities and Publications - Findings and Opportunities

2017

User facilities are specialized government-sponsored research infrastructure available for external use to advance scientific or technical knowledge. Researchers compete for access to these facilities and specialized equipment, but do not consistently acknowledge the contributions made by facilities when they publish the results of their work. Collection of these research outputs is necessary to enable an accurate assessment of the scientific impact of these public investments. Recently several user facilities have begun to explore innovative approaches to these challenges, including adoption of ORCID. This report summarizes the discussions of the User Facilities and Publications Working Group, which focused on ascertaining what data would help agencies and facilities to map impact, and to determine whether and how ORCID could enable its collection in a manner that increases data capture and reduces reporting burden for researchers. The group had three objectives: to bring together ...

D3.1 Survey Of Current Pid Services Landscape

2018

A comprehensive survey of the landscape of persistent identifiers across many disciplines is presented, with assessments of maturity of different PID types and conclusions for the future.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Recommendations for use of annotations and persistent identifiers in taxonomy and biodiversity publishing

Research Ideas and Outcomes

The paper summarises many years of discussions and experience of biodiversity publishers, organisations, research projects and individual researchers, and proposes recommendations for implementation of persistent identifiers for article metadata, structural elements (sections, subsections, figures, tables, references, supplementary materials and others) and data specific to biodiversity (taxonomic treatments, treatment citations, taxon names, material citations, gene sequences, specimens, scientific collections) in taxonomy and biodiversity publishing. The paper proposes best practices on how identifiers should be used in the different cases and on how they can be minted, cited, and expressed in the backend article XML to facilitate conversion to and further re-use of the article content as FAIR data. The paper also discusses several specific routes for post-publication re-use of semantically enhanced content through large biodiversity data aggregators such as the Global Biodiversit...

Indispensable Necessity - Researchers? Digital Identity: Special Reference to ORCID ID

International Journal of Library and Information Studies, 2018

In last two decades research and number of researcher also increased day by day as the technology remove the boundary barrier of information access. The researcher must be cite the research article which used by them in the research work. But ambiguity in name is one of the big challenges while citation and citation analysis too. As the various naming style exist worldwide and with the different naming style it becomes more difficult to count the citation credit. Unique identification to a researcher give the solution of this name ambiguity and give proper citation record and mange the whole research contribution of researcher on a single platform. Non-profit community driven ORCID, Inc provides the ORCID-Open Researcher and Contributor ID the unique research identification to a researcher, and linking the researcher research contribution with other IDs. It kept not only the contribution record of researcher but also useful to researcher for job profiling, for project funding and as well useful to the publishers, organization, funding agencies, government to keep track on researcher contribution toward subject. The paper describes the features of identifiers and point out the requirements of identifiers adoption in special context of ORCID. Worldwide numbers of researcher register in ORCID by individual or via consortia base. In India individual researcher register in small number in compare of numbers of Indian researchers, but not any consortia till register in ORCID from India. The Government and private Funding agency, Education Commissions, Education committees, Organization, nation information center like INFLIBNET have to be develop a proper system for uplift the researcher's registration in Open source unique identifier ORCID.

Open Researcher and Contributor Identifier and other author identifiers: Perspective from Pakistan

JPMA. The Journal of the Pakistan Medical Association, 2019

The Open Researcher and Contributor ID (ORCID) is a globally trending initiative for author name disambiguation and serves as a 'digital curriculum vitae' for displaying an individual's research output. Although there are several other tools similar to ORCID, the collaborative efforts by ORCID make it the most attractive option. Most of the organizations and publishers are increasingly adopting ORCID in their systems, and authors from West and other parts of the world have attempted to create awareness about ORCID initiative. However, researchers from Pakistan and other developing countries should be introduced to this concept and be encouraged to adopt to such initiatives. Therefore, this paper aims to present a brief introduction to author identifiers, with special focus on the ORCID.

Automating and Simplifying Multiparty Workflows

2018

Any broadcast organization that remains static runs the risk of being overtaken by newer, more agile alternatives. To remain competitive, broadcasters must constantly work to increase process velocity, accuracy, and flexibility. These goals cannot be reached without reducing time to market, manual touch-points, and associated labor costs. A major hurdle on this road to efficiency is the absence of a universal method to identify content, resulting in unnecessary manual workflows and timeand resource-consuming communications with third parties for the production, processing, and exchange of content. Root causes for these impracticalities include problems with work identification during acquisition, reconciliation, and de-duplication of assets obtained from multiple sources; placing high demands on limited resources; and causing delays or reducing content capacity. A necessary element to solve this problem is the use of globally unique and persistent works identification. As such, it w...

Surveillance and identity: conceptual framework and formal models

Journal of Cybersecurity, 2017

Surveillance is recognized as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualizing surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.

Quantifying the interoperability of Open Government datasets

Open Governments use the Web as a global dataspace for datasets. It is in the interest of these governments to be interoperable with other governments worldwide, yet there is currently no way to identify relevant datasets to be interoperable with and there is no way to measure the interoperability itself. In this article we discuss the possibility of comparing identifiers used within various datasets as a way to measure semantic interoperability. We introduce three metrics to express the interoperability between two datasets: the identifier interoperability, the relevance and the number of conflicts. The metrics are calculated from a list of statements which indicate for each pair of identifiers in the system whether they identify the same concept or not. While a lot of effort is needed to collect these statements, the return is high: not only relevant datasets are identified, also machine-readable feedback is provided to the data maintainer.

Tracking researchers and their outputs: new insights from ORCIDs

Scientometrics, 2017

The ability to identify scholarly authors is central to bibliometric analysis. Efforts to disambiguate author names using algorithms or national or societal registries become less effective with increases in the number of publications from China and other nations where shared and similar names are prevalent. This work analyzes the adoption and integration of an open source, cross-national identification system, the Open Researcher and Contributor ID system (ORCID), in Web of Science metadata. Results at the article level show greater adoption, to date, of the ORCID iD in Europe as compared with Asia and the US. Focusing analysis on individual highly cited researchers with the shared Chinese surname "Wang," results indicate wide scope for greater adoption of ORCID. The mechanisms for integrating ORCID iDs into articles also come into question in an analysis of co-authors of one particular highly cited researcher who have varying percentages of articles with ORCID iDs attached. These results suggest that systematic variations in adoption and integration of ORCID into publication metadata should be considered in any bibliometric analysis based on it.

Publishing, identifiers & metrics: Playing the numbers game

Health Prospect, 2021

The number of scientific articles published each year is rapidly growing and so is the number of academic journals. This makes it impossible for an individual practitioner or researcher to keep track of all research published in their own field or sub-discipline. With the growing amount of publications, it is also becoming more difficult to distinguish between similar papers published on the same topic, in the same journal, or by the same researchers (or research team). This perspective paper could support students and novice researchers, outlines the difference between the unique identifier for: (1) you as the researcher, (2) a specific paper; and (3) a specific journal. This paper further outlines the various numerical identifiers associated with academic publishing to help demystify academic publishing.

Cited by

Conceptualizing the Harm done by Rape: Applications of Trauma Theory to Experiences of Sexual Assault

Trauma Violence & Abuse, 2003

Based on a review of theory and evidence, this article highlights the limitations of trauma response models and applications of posttraumatic stress to characterize the experiences of women who are raped. There are two primary problems with trauma response theories. First, traditional notions of trauma are likely too narrow to accurately capture the complexities of women's experiences of sexual violence in a gendered society. Second, the symptoms emphasized by clinical applications of the trauma model may legitimate one sociocultural manifestation of distress while excluding others. Alternative conceptualizations are presented to stimulate more ecologically grounded and culturally inclusive study of sexual violence. Using the rape of women as an example, this article illustrates the limitations of Western views of trauma and encourages researchers and practitioners to expand notions of survivors' responses to painful events.

Hispanic Perspectives on Sexual Harassment and Social Support

Personality and Social Psychology Bulletin, 2004

Bridging the social support, sexual victimization, and cultural psychology literatures, this study examines social-support processes in the context of sexual harassment and Hispanic American culture. Surveys were administered to a community sample of Hispanic American working women, 249 of whom described some encounter with sexual harassment at work. Regression results provided mixed backing for hypotheses about supportseeking behavior, which appeared largely dependent on the social power of the harassment perpetrator. Additional findings upheld predictions about support-perception patterns; harassed women perceived more supportive social reactions when they turned to informal networks of friends and family, but responses were less positive when they turned to formal, organizational sources. Finally, as expected, perceived support and acculturation interacted to moderate relations between sexual harassment and job satisfaction. The article concludes with implications for research and interventions related to social support and sexual harassment.

Posttraumatic Stress Disorder and Social Support in Female Victims of Sexual Assault: The Impact of Spousal Involvement on the Efficacy of Cognitive-Behavioral Therapy

Behavior Modification, 2008

The goal of this study is to enhance the efficacy of CBT with victims of sexual assault suffering from PTSD by getting the spouse involved. Thus, in addition to attempting to reduce PTSD symptoms, the therapy focuses on improving the support offered by the spouse and favors management of the impact of the traumatic event within the couple. A single-case, multiple-baseline across-subjects design is used. Three victims of sexual assault with a diagnosis of PTSD participated in the study. Results at posttreatment and at 3-month follow-up are promising. None of the participants presents a diagnosis of PTSD, and all report a significant improvement in their satisfaction with the support received from their spouses.

Factors Related to Willingness to Help Survivors of Intimate Partner Violence

Journal of Interpersonal Violence, 2008

Although researchers have found that survivors of intimate partner violence seek support from a multitude of sources, ranging from professionals to informal support networks, little is known about the extent to which community members reach out to help survivors. This study explored the type of support provided to survivors and various factors that relate to individuals' willingness to help. Survivors were more likely to be helped by women, younger individuals, those who strongly endorsed criminal justice interventions for perpetrators, and those who perceived intimate partner violence as a frequently occurring issue in their communities. Two additional factors were found to relate to an individual's likelihood of assisting others, including witnessing intimate partner violence as a child and prior victimization. Further research is needed in this area to explore helper, survivor, and contextual characteristics that may affect one's likelihood to offer assistance to survivors.

Rethinking Social Support and Conflict: Lessons from a Study of Women Who Have Separated from Abusive Partners

Nursing Research and Practice, 2012

Relationships have both positive and negative dimensions, yet most research in the area of intimate partner violence (IPV) has focused on social support, and not on social conflict. Based on the data from 309 English-speaking Canadian women who experienced IPV in the past 3 years and were no longer living with the abuser, we tested four hypotheses examining the relationships among severity of past IPV and women's social support, social conflict, and health. We found that the severity of past IPV exerted direct negative effects on women's health. Similarly, both social support and social conflict directly influenced women's health. Social conflict, but not social support, mediated the relationships between IPV severity and health. Finally, social conflict moderated the relationships between social support and women's health, such that the positive effects of social support were attenuated in the presence of high levels of social conflict. These findings highlight that routine assessments of social support and social conflict and the use of strategies to help women enhance support and reduce conflict in their relationships are essential aspects of nursing care.

The Impact of Disclosure of Intimate Partner Violence on Friends

Journal of Interpersonal Violence, 2015

Two factors potentially affect observers'attributions of responsibility to a rape survivor: how closely they identify with the survivor and how much they adhere to rape myths. To assess the impact of these factors, 157 female college students categorized by their sexual assault history and by their acceptance of rape myths, evaluated a sexual assault scenario. It was hypothesized that previously victimized participants would attribute less blame, and that those participants who self-identify as rape survivors would view the assault as rape more often than other participants. Neither hypothesis was supported. As expected, those who scored higher on the Rape Myths Acceptance Scale (RMAS) blamed the victim more and were less likely to believe rape had occurred. Only one subscale of the RMAS, Adversarial Sexual Beliefs, was consistently associated with participants'evaluation of the scenario, suggesting that this dimension may be especially important to understanding an observer's assessment of rape.

Urban Teens and Young Adults Describe Drama, Disrespect, Dating Violence and Help-Seeking Preferences

Maternal and Child Health Journal, 2012

Adolescent dating violence is increasingly recognized as a public health problem. Our qualitative investigation sought input from urban, African-American adolescents at risk for dating violence concerning (Tjaden and Thoennes in Full report of the prevelance, incidence, and consequences of violence against women: findings from the national violence against women survey. US Department of Justice, Washington, DC, 2000) dating violence descriptions, (WHO multi-country study on women's health and domestic violence against women: Summary report of initial results on prevalence, health outcomes and women's responses. World Health Organization, Geneva, 2005) preferences for help-seeking for dating violence, and (Intimate partner violence in the United States.

Social Reactions and Women’s Decisions to Report Sexual Assault to Law Enforcement

Violence Against Women, 2019

Following sexual assault, little is known about how the social reactions women receive from informal supports and community-based providers relate to decisions to report to law enforcement. Among 213 diverse women who had disclosed a recent sexual assault to a community-based provider, 56% reported to law enforcement. Law enforcement reporting was associated with more positive (tangible aid) and less negative (distraction, being treated differently) reactions from informal supports and more tangible aid and less emotional support from community-based providers. Tangible aid from community-based providers predicted law enforcement reporting over the subsequent 9 months among women who had not initially reported.