首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The term Government Transfer Services is used in reference to any of the organized streams of public resources that flow into private economic activity. This includes such activities as offshore leasing, Social Security, and NASA technology transfer services. This paper describes a performance measure, empirical results, a theory, and a control model for such services. These are illustrated by a specific example (NASA). An agenda for developing this service control method is also presented.  相似文献   

2.
McFall’s (1982, 1989) Social Information Processing (SIP) model outlines different stages in cognitive processing and decision-making that may be deficient in men who engage in interpersonal violence (IPV). A decision-making task was developed to assess the utility of abusive and nonabusive behaviors among 32 men who engage in mild IPV, 32 maritally distressed men, and 32 nondistressed men. Because anger impacts appraisal and decision-making (e.g., Lerner and Tiedens in Journal of Behavioral Decision Making, 19, 115-137, 2006), all participants were randomly assigned to an anger induction or neutral induction condition. As hypothesized, the perceived utility for abusive behavior was greater for angry abusive men and the perceived utility of control appeared to significantly contribute to this difference. Specific deficits in the IPV group were found, supporting a SIP model of IPV, aiding in understanding the function of violent behavior. Despite study limitations, these findings have implications for enhancing specific skill training components of treatment for abusive men.  相似文献   

3.
A risk marker analysis of assaulted wives   总被引:1,自引:0,他引:1  
In the wife assault literature, a number of risk markers have been identified. Using the data of the female respondents to the National Family Violence Survey (n = 699), a multivariate analysis was performed to examine which risk factors best differentiated between women involved in nonviolent relationships, verbally aggressive relationships, relationships exhibiting minor physical aggression and severely violent relationships. High levels of marital conflict and lower socioeconomic status emerged as the primary predictors of an increased likelihood of wife assault. Research implications are discussed.  相似文献   

4.
During the past decade the courts have taken an increasingly active rule in shaping the physical facilities that house environmentally captive individuals. Perhaps the most influential of these cases was Wyatt v. Stickney (1972), which has been cited as a basis for standards promulgated by other courts (e.g., Davis v. Hubbard, 1980), for model standards (Staff, 1977), and for changes made by administrators fearing litigation (Sommer & Kroll, 1979). Despite this widespread acceptance, there was no apparent empirical basis for, or validation of, the standards. The purpose of the present study was to assess the validity of the behavioral assumptions underlying the Wyatt standards regarding physical changes intended to ensure patient privacy. Patient perceptions of privacy were examined on two units in a facility that met the standards mandated in Wyatt. The results demonstrated that although some of the court's assumptions were valid, several were not, and that overall the standards in this influential case do not ensure patient privacy for the institutionalized mentally ill. The implications of these findings are discussed.  相似文献   

5.
In a recent study of Malm and Bichler (Trends in Organized Crime 16:365–381, 2013) it was found that very little professional laundering occurs in illicit markets. That is to be expected because not every criminal will make enough money to have a need for the services of professional money launderers. However, it is less clear to what extent the same outcome applies to those criminals who do make a lot of criminal money. In order to find out, 31 case studies were examined that deal with large scale importation of cocaine in Europe. It appears that professionals are often engaged, as almost half of the files indicate the presence of such specialists. However, that doesn't imply that such specialists are absent in the other half of the files. After examination of the investigative strategy of each police investigation, it turns out that there is a strong correlation between a focus on financial matters at the beginning of an investigation and the finding of professional launderers. This has important implications for the use of Social Network Analysis and qualitative case file research. The nonappearance of certain types of people in the police investigations has as much to do with the investigative strategy as with their real absence.  相似文献   

6.
Most research on physical abuse in relationships has been conducted from the perspective of the individual. Data compiled on couples have been mostly aggregate in nature. The present study examines physical violence at the level of the relationship from the perspective of both individuals involved. Using the Circumplex Model of Family Functioning as the conceptual framework, 75 intact couples in a counseling agency completed the Conflict Tactics Scale and the FACES III inventory at intake. The purpose of the research was to define characteristics of violent couples in terms of adaptability and cohesion in the relationship as measured by the self-report questionnaires. Findings suggest that violent couples are significantly more rigid on the adaptability dimension of FACES III. However, contrary to suggestions that violent couples are enmeshed, the present results showed that they were significantly more disengaged as measured by FACES III. Implications of the findings for therapeutic intervention of violent couples is discussed.  相似文献   

7.
Technology transfer is the process by which technology originating at one institutional setting is adapted for use in another. A major impediment to the implementation of new technologies to assist with mangerial decision-making problems is a lack of communication between the technology and management communities. Development of a tool designed to bridge the technology transfer gap was the goal of this research. The result is a prototype software package which may be used on an interactive computer terminal by a manager for assistance in designing a decision support system (DSS). The four primary research tasks were:
  1. Develop a conceptual model of the DSS design process.
  2. Select and adapt, or create, appropriate software to mechanize the model.
  3. Develop a knowledge base to describe the interactiveness of various organization variables and managerial decision-making needs.
  4. Collect and analyze interview data and implement resultant production rules on the model.
Tasks 1 and 2 were accomplished first to establish the feasibility of this effort. An interview instrument was developed for Task 3. And, corporate managers from several firms were interviewed to accomplish Task 4. Using this data, a prototype production rule model (called DECAIDS for DECISION AIDS) was constructed which supports managerial decision-making from the EMYCIN production rule system used at Stanford University. The purpose of this article is to introduce the need for a Decision Support System Model. A complete copy of this research can be obtained through University Microfilms International, 300 N. Zeeb Road, Ann Arbor, Michigan 48106, from the Naval Postgraduate School, Monterey, California 93940, or the Defense Technical Information Center, Cameron Station, Alexandria, Virginia 22314. The title is “An Interactive Decision Support System for Technology Transfer Pertaining to Organization and Management”, 1980.  相似文献   

8.

Objective

This study examines whether radical eco-groups have been deterred by legal sanctions. From a rational choice framework, I argue that members of these groups weigh costs and benefits. I measure an increase in costs, or an objective deterrence effect, through four federal sentencing acts targeted at reducing the criminal behavior of these groups [the tree-spiking clause of the Anti-Drug Abuse Act (ADA), the Animal Enterprise Protection Act (AEPA), the Anti-Terrorism and Effective Death Penalty Act (AEDPA), and the Animal Enterprise Terrorism Act (AETA)] and hypothesize that this legislation decreased the hazard of subsequent attacks.

Methods

This research is a quasi-experimental design utilizing the 1,068 illegal incidents perpetrated in the name of the environment, animal, or both as extracted from the Eco-Incidents Database. Using series hazard modeling, I examine the time until the next incident, serious incident, and ideologically specific incident in relation to dummy variables operationalizing the enactment dates of the above legislation.

Results

All in all, the results are somewhat consistent with a rational choice framework and my hypotheses. The ADA decreased the hazard of another attack (11 %) and environment-only attack (15 %), while at the same time increasing the hazard of a terrorist, damage, and animal-related attack. AETA decreased the hazard of all (47 %), damage (42 %), and the behavior it was aimed at, that of animal-only incidents (52 %). However, neither the AEPA, nor AEDPA had a significant effect on any of the outcomes.

Conclusions

Overall, radical eco-groups were deterred by legal sanctions, but these findings are legislation and outcome specific in addition to including displacement effects.  相似文献   

9.
How does arms availability affect armed conflict? What implications does increased arms availability have for the organisation of armed groups involved in war against the state? This article explores these questions by looking into the civil war in Libya and the subsequent proliferation of weapons in the broader Sahel/North Africa region. Its argument is based on secondary sources: online databases, international organisations reports and news media. First, we examine the question of firearms in Libya in order to understand how changing conditions of weapons availability affected the formation of armed groups during different phases of war hostilities (February–October 2011). We highlight that, as weapons became more readily available to fighters in the field during this period, a process of fragmentation occurred, hindering efforts to build mechanisms that would allow control of the direction of the revolutionary armed movement. Next, as security continued to be a primary challenge in the new Libya, we consider the way in which unaccountable firearms and light weapons have affected the post-war landscape in the period from October 2011 to the end of 2013. Finally, we put the regional and international dimensions under scrutiny, and consider how the proliferation of weapons to nearby insurgencies and armed groups has raised major concern among Libya’s neighbours. Short of establishing any causal relationship stricto sensu, we underscore the ways in which weapons from Libya have rekindled or altered local conflicts, creating permissive conditions for new tactical options, and accelerating splintering processes within armed movements in the Sahara-Sahel region.  相似文献   

10.
A series of investigations were conducted to develop an ego-strength scale from items in the Child Abuse Potential Inventory. Using a two-dimensional model of ego-strength, face valid items were selected. After an initial screening of face valid items using Barron's ego-strength scale, a multiple criterion item validation process was conducted using factors from the 16PF questionnaire. This procedure produced a 40-item ego-strength scale where all items had significant item-total correlations. Internal consistency and temporal stability of the ego-strength scale were found to be adequate. Factor analyses suggested the ego-strength scale is unitary, measuring emotional stability in relationships. Moderator variable effects were found to be modest. Most important, ego-strength scale data collected from nurturing parents, general population parents, at-risk parents, and groups engaging in various forms of family violence yielded scores that discriminate between groups in a predictable manner.  相似文献   

11.
12.

Objectives

The development and application of methods to assess consistency in sentencing before and after the 2011 England and Wales assault guideline came into force.

Methods

We use the Crown Court Sentencing Survey to compare the goodness of fit of two regression analyses of sentence length on a set of legal factors before and after the assault guideline came into force. We then monitor the dispersion of residuals from these regressions models across time. Finally, we compare the variance in sentence length of equivalent types of offences using exact matching.

Results

We find that legal factors can explain a greater portion of variability in sentencing after the guideline was implemented. Furthermore, we detect that the unexplained variability in sentencing decreases steadily during 2011, while results from exact matching point to a statistically significant average reduction in the variance of sentence length amongst same types of offences.

Conclusions

We demonstrate the relevance of two new methods that can be used to produce more robust assessments regarding the evolution of consistency in sentencing, even in situations when only observational non-hierarchical data is available. The application of these methods showed an improvement in consistency during 2011 in England and Wales, although this positive effect cannot be conclusively ascribed to the implementation of the new assault guideline.  相似文献   

13.
14.
A number of social and psychological factors present in most adolescent parents place them at high risk for abusive behavior toward their children. However, current child abuse potential measures do not include adolescent samples as part of the psychometric data base. Consequently, the purpose of this study was twofold: (1) to investigate whether a Black adolescent sample would perform differently than an adult nonabusing sample on the Child Abuse Potential Inventory (CAP), and (2) to examine the relationship between history of abuse or witnessing violence to scores on the CAP. Results revealed that Black adolescents scored significantly higher than the adult normative sample on the CAP; consequently, cutoff scores need to be empirically established for adolescents. Additional analyses indicated that a history of abuse, as well as a history of witnessing violence, are associated with a high potential for abuse.  相似文献   

15.
In this paper we test several specific hypotheses derived from the intergenerational transmission of violence thesis to see if exposure to physical abuse has a special role in the etiology of violence. We employ a systematic statistical approach using data from the National Longitudinal Study of Adolescent Health (Add Health). Our findings suggest that a history of physical abuse is strongly associated with frequency of violence, but the association is not specific to violence and is mediated by their common association with nonviolent offending. Further, the association between physical abuse and violence is not significantly larger than the association between neglect or sexual abuse and violence. In summary, the data suggest that the association between abuse and violence is not unique to physical abuse and that the impact of physical abuse is not specific to violent behavior.  相似文献   

16.
The NASA Technology Transfer Program has taken on a variety of roles during the past twenty years. This paper briefly reviews these roles. It presents then several organized approaches that could be adopted to maximize the cost/benefit of technology transfer from NASA to the private sector.  相似文献   

17.
During the summer of 1985, LCDR Robert Cox completed a course entitled “Technology Transfer” at the U.S. Naval Postgraduate School, Monterey, California. The objectives of the course were to enhance the capability of course participants to take advantage of innovations, to move appropriate research and development results into use, and to gain insight into the Technology Transfer responsibilities of managers. LCDR Cox' paper was chosen from among several contributions as an example of the application of Technology Transfer principles to a manager's job.  相似文献   

18.
This paper is based upon research done under the National Science Foundation sponsored study The Role of Industry in Urban Technology Transfer: A Comparative Profile. The purpose of the research is to investigate specific industries that serve the urban market of local governments. The research aim is to develop an understanding for the barriers and incentives that affect industry's ability and desire to produce and market technological innovations for cities.  相似文献   

19.
Traditionally, new technology has been slow to enter the paper industry, which turns over its capital stock in about 40 years. In this paper, we will examine some of the reasons for this long transition period and the implications of such a transition period for government policy. If the turnover time could be cut in half, the potential energy savings could be 4 quadrillion Btu (Quads) in 20 years. Examples of new technologies that will become prominent throughout the paper industry by the year 2000 include vapor recompression evaporation, oxygen bleaching, twin-wire forming and extended nip pressing. We present explicit projections of production shares (based on a computer model) for selected new technologies. New technology blends into an industry over a period of years. This paper examines some of the factors that accelerate or retard this transition in the capital-intensive (“heavy”) industries. For purposes of this article, our example is the paper industry, and so the examples of new innovations are drawn from pulp and paper-making processes. (Incidentally, we use the term “paper” throughout as a shorthand for SIC 26, Pulp, Paper and Paperboard.) The examination of paper-industry technology reported here is based to a great extent on a study of industrial energy use [1] conducted by the Office of Technology Assessment (OTA) for the U.S. Congress. The OTA study examined the four most energy-intensive American industries (paper, steel, chemicals and petroleum refining), to identify technologies to improve energy efficiency, to project industrial energy use in each industry between now and the end of the century, and to assess the impact of various policies on energy use and energy efficiency. The study found remarkable similarities between the four industries. One notable commonality is the attitude of management towards introduction of new technology.  相似文献   

20.
General hospitals are increasingly important sources of care for chronic and acute mental patients. Joint Commission on Accreditation of Hospitals (JCAH) standards for staffing in general hospitals require the same degree of physician supervision and control for all services, including mental health. This paper considers the economic impact of JCAH standards on the practice of psychologists in hospitals. The “voluntariness” of the standards is assessed and the evidence that these standards foster economic protectionism is considered. We conclude that in light of the demonstrated capability of nonphysician professionals, methods of quality control appropriate for physician health care in general hospitals should be reconsidered as these instutions diversify into mental health services.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号