首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
How does arms availability affect armed conflict? What implications does increased arms availability have for the organisation of armed groups involved in war against the state? This article explores these questions by looking into the civil war in Libya and the subsequent proliferation of weapons in the broader Sahel/North Africa region. Its argument is based on secondary sources: online databases, international organisations reports and news media. First, we examine the question of firearms in Libya in order to understand how changing conditions of weapons availability affected the formation of armed groups during different phases of war hostilities (February–October 2011). We highlight that, as weapons became more readily available to fighters in the field during this period, a process of fragmentation occurred, hindering efforts to build mechanisms that would allow control of the direction of the revolutionary armed movement. Next, as security continued to be a primary challenge in the new Libya, we consider the way in which unaccountable firearms and light weapons have affected the post-war landscape in the period from October 2011 to the end of 2013. Finally, we put the regional and international dimensions under scrutiny, and consider how the proliferation of weapons to nearby insurgencies and armed groups has raised major concern among Libya’s neighbours. Short of establishing any causal relationship stricto sensu, we underscore the ways in which weapons from Libya have rekindled or altered local conflicts, creating permissive conditions for new tactical options, and accelerating splintering processes within armed movements in the Sahara-Sahel region.  相似文献   

2.
NASA's Charter demands that innovations arising from the agency's work receive the widest possible dissemination to bring about a transfer of the technology to the public welfare. This Spinoff from the Space Program is now a predictable event because of analyses done over the years by NASA and economists. However, the initial identification of innovations must be done through disclosures from NASA, prime contractor and subtier contractor employee innovators. Although NASA provides innovators with nominal cash awards for published innovations and inventions, a problem exists for NASA in assuring that all valuable innovations and inventions get promptly identified, reported and disseminated. This paper describes the technique developed by NASA's prime contractor for Shuttle Orbiter (Rockwell Space Division), which has successfully captured over 1200 innovations for NASA-JSC. Aspects of the Program described include the contract requirements, motivational techniques, results, problems, and a discussion of the results. An order of magnitude increase in innovation reporting resulted from Rockwell's activities primarily accomplished using an inexpensive four-step process implemented at about 200 subcontractor's facilities.  相似文献   

3.
This study investigated the impact of the abolition of the tender years doctrine on custody decisions in divorce cases. This doctrine supported the presumption that the mother is the more suitable parent for young children. In March of 1981, the Supreme Court of the State of Alabama found this doctrine to be unconstitutional. To assess the hypothesis that this ruling had a significant effect on custodyrelated decisions, a sample of court records for divorce cases in an Alabama county was examined as representative of the state on a number of key variables. Overall, no significant differences were found on indicator variables for the comparisons before and after the ruling. There was neither an increase in custody grants to fathers nor an increase in custody requests by fathers.  相似文献   

4.
In this paper we test several specific hypotheses derived from the intergenerational transmission of violence thesis to see if exposure to physical abuse has a special role in the etiology of violence. We employ a systematic statistical approach using data from the National Longitudinal Study of Adolescent Health (Add Health). Our findings suggest that a history of physical abuse is strongly associated with frequency of violence, but the association is not specific to violence and is mediated by their common association with nonviolent offending. Further, the association between physical abuse and violence is not significantly larger than the association between neglect or sexual abuse and violence. In summary, the data suggest that the association between abuse and violence is not unique to physical abuse and that the impact of physical abuse is not specific to violent behavior.  相似文献   

5.
The NASA Technology Transfer Program has taken on a variety of roles during the past twenty years. This paper briefly reviews these roles. It presents then several organized approaches that could be adopted to maximize the cost/benefit of technology transfer from NASA to the private sector.  相似文献   

6.
The present paper offers resource material for evaluation of malingering, response bias, and symptom and performance validity. The material mostly consists of noncontroversial, paraphrased excerpts from relevant consensus statements, guidelines, codes, books, and articles. The five principles of the American Psychological Association (APA) ethics code were used to integrate the material. In addition, five other principles were needed (e.g., on science). The companion article on a new consensus statement on the ethical use of symptom and performance validity written for the Association for Psychological Advancement in Psychological Injury and Law (ASAPIL) in the journal Psychological Injury and Law (PIL; Bush, Ruff, & Heibronner, 2014) was instigated by and written partly based on the resources described in the present paper. The resources offered in the present paper are divided into the following sections: I. Malingering; II. Related Terms; III. APA Ethics Code; IV. Other Ethics Guidelines; V. Practice Guidelines; VI. Assessment Guidelines; VII. Other Ethical Sources; IX. Biases, Fallacies, Errors; X. Prior SVT-M/PVT-M Statements; XI. A New Ethical Model of Ten Principles; and XII. Instrumentation, and followed by Conclusions. The ten principles of the present ethical guidelines could be used to help revise the APA ethics code. The companion statement constitutes a major advance in the field and the present resource material facilitates its use.  相似文献   

7.
Most research on physical abuse in relationships has been conducted from the perspective of the individual. Data compiled on couples have been mostly aggregate in nature. The present study examines physical violence at the level of the relationship from the perspective of both individuals involved. Using the Circumplex Model of Family Functioning as the conceptual framework, 75 intact couples in a counseling agency completed the Conflict Tactics Scale and the FACES III inventory at intake. The purpose of the research was to define characteristics of violent couples in terms of adaptability and cohesion in the relationship as measured by the self-report questionnaires. Findings suggest that violent couples are significantly more rigid on the adaptability dimension of FACES III. However, contrary to suggestions that violent couples are enmeshed, the present results showed that they were significantly more disengaged as measured by FACES III. Implications of the findings for therapeutic intervention of violent couples is discussed.  相似文献   

8.
During the summer of 1985, LCDR Robert Cox completed a course entitled “Technology Transfer” at the U.S. Naval Postgraduate School, Monterey, California. The objectives of the course were to enhance the capability of course participants to take advantage of innovations, to move appropriate research and development results into use, and to gain insight into the Technology Transfer responsibilities of managers. LCDR Cox' paper was chosen from among several contributions as an example of the application of Technology Transfer principles to a manager's job.  相似文献   

9.
Forensic psychologists often refuse to release evaluation records, especially to the evaluee. One justification for this practice is based on the ethical positions that the referral source “is the client” and “controls release of records” (also found in the Specialty Guidelines for Forensic Psychology). To determine whether these ethical positions are shared by the field of forensic mental health, official documents from forensic mental health organizations were used as a proxy for these views. Thirty-four supporting arguments for either position were identified from the literature; it was postulated that official documents would support both positions and utilize supporting arguments. Fifty-four official documents were discovered, and qualitative analysis was used to construct a 17-category model of official views. Neither position was supported by a majority of documents, and few of the supporting arguments were utilized by supportive documents. The positions are unsupported because official documents espouse a wide diversity of views, there are a number of logical flaws in supporting arguments, and even official APA documents hold conflicting views. Ethical arguments are advanced for contrary positions, and the referral-source-control of records release is contrary to law. A more ethical view is that the psychologist may have multiple, possibly conflicting responsibilities to multiple entities; the psychologist’s roles and responsibilities should be clarified with each entity using an informed consent process. Psychologists should release records at the behest of the evaluee, lest they be subject to licensing discipline, Health Insurance Portability and Accountability Act (HIPAA) complaints, and/or civil sanctions. Recommendations are offered for psychologists, future ethics codes and professional practice guidelines, and test security practices.  相似文献   

10.
The Technology Transfer issue has aroused much controversy in the last two decades among management researchers. This paper attempts to discuss the problems of Technology Transfer, the debate on this issue and some of the theories concerned. It also presents a suggested theoretical framework to assist the LDCs in determining need for, and receiving of, new technology.  相似文献   

11.
The term Government Transfer Services is used in reference to any of the organized streams of public resources that flow into private economic activity. This includes such activities as offshore leasing, Social Security, and NASA technology transfer services. This paper describes a performance measure, empirical results, a theory, and a control model for such services. These are illustrated by a specific example (NASA). An agenda for developing this service control method is also presented.  相似文献   

12.
The Logistics Support Laboratory at the Belvoir Research and Development Center is responsible for the development of water purification equipment for the field Army. Developing water purification systems for military use has led to technological breakthroughs which have benefitted the civilian community. Two examples are the evaluation of the Army's ERDLator for the decontamination of water polluted with asbestos fibers, and design of a plant for the soluble-sulfide precipitation of heavy metals from industrial wastewater.  相似文献   

13.
In a series of cases decided over the past decade, the U.S. Supreme Court has consistently held that laws providing for both preventive detention and preventive execution do not violate Constitutional guarantees. Preventive detention and preventive execution share a common method and goal: Determine which individuals pose a threat to society and then remove those persons from society (i.e., incarcerate them) or-if they have also been convicted of first degree murder-execute them. In each of these cases, the Court has been presented with behavioral science data indicating that most predictions of dangerousness-anywhere from 51% to 95%-prove to be wrong. This article describes the relevant data and the Court's response to those data, then considers why the Court has responded as it has, what the Court's response may mean with regard to the future role of behavioral science data in Constitutional litigation regarding the rights of those accused or convicted of crimes, and what, if anything, behavioral scientists might do to enhance the utility and influence of empirical data in such litigation.  相似文献   

14.
This report reviews technology transfer in light of the Stevenson-Wydler Technology Innovation Act of 1980. Following a brief introduction, a section on “Definitions” explains the several meanings that the phrase “technology transfer” now carries in policy discussions. The next section, on “Passive Technology Transfer”, reviews traditional Department of Defense scientific and technical information programs that relate to technology transfer. A section on “Military Industrial Transfer” examines technology transfer from the Defense Department to private industry, expecially to defense contractors. A section on “The Stevenson-Wydler Act and Active Technology Transfer” describes the principal provisions of the new act and why Congress passed it. The next two sections, on “NASA’s Technology Transfer Program” and “The Federal Laboratory Consortium” outline the two existing Government programs Congress relied upon in developing ideas for the new law. A section on “Implementation of the Stevenson-Wydler Act”, discusses several important issues that must be considered by Navy laboratory management as the new law is put into effect in the Navy. Finally, a brief conclusion emphasizes the major point of the report: That Congress, in passing the Stevenson-Wydler Act, did not fully consider what relationship the new technology transfer programs it was requiring in the Executive Branch should bear to existing programs with similar purposes. If the public interest is to be served, the report argues, the Navy must consciously and carefully determine the proper nature of this relationship.  相似文献   

15.
A risk marker analysis of assaulted wives   总被引:1,自引:0,他引:1  
In the wife assault literature, a number of risk markers have been identified. Using the data of the female respondents to the National Family Violence Survey (n = 699), a multivariate analysis was performed to examine which risk factors best differentiated between women involved in nonviolent relationships, verbally aggressive relationships, relationships exhibiting minor physical aggression and severely violent relationships. High levels of marital conflict and lower socioeconomic status emerged as the primary predictors of an increased likelihood of wife assault. Research implications are discussed.  相似文献   

16.
Wide variations in prevalence estimates of marital aggression point to the absence of a uniform and adequate definition of marital aggression. To focus on the construct validity of Straus' (1979) Conflict Tactics Scales, the most frequently used measure of marital aggression, two studies were conducted. Based on responses to the Conflict Tactics Scales, two consistent factors (viz. Physical and Psychological Aggression) emerged in separate samples of 187 couples seeking therapy for marital problems, and 398 nonclinic couples in beginning marriages. The factor structure was consistent across clinic and nonclinic samples, sex, geographical sites, time, and socioeconomic status. Implications for the measurement of interspousal physical aggression are raised (e.g., mild, moderate, and severe aggression load on the same factor) and appropriate directions for further research on the construct validity of the Conflict Tactics Scales are suggested (e.g., conducting similar factor analyses on aggressive couples).  相似文献   

17.
Nearly one-third (28.4 %) of adolescents experience some form of physical assault in the home. A survey of 176 adolescents documents optimistic bias; adolescents believe they are less likely than others to become victims of family violence. Elements of the Health Belief Model, perceived susceptibility and perceived severity, predicted optimistic bias. The study also considers the impact vicarious experience through the media on adolescent risk perception.  相似文献   

18.
This study compares 202 juvenile offenders on a series of preoffense adjustment variables grouped into five categories: Family Dysfunction, School Adjustment, Prior Violence, Criminal Activity, and Substance Abuse. Emphasis is placed on the importance of distinguishing subgroups of violent youth based on the type of assault (interpersonal conflict or crime-related) and the youth's relationship to the victim (parent or other victim). Findings support the need to identify multiple developmental pathways and distinctive risk factors for different forms of juvenile violence.  相似文献   

19.
In later Yogācāra, the path to enlightenment is the course of learning the Four Noble Truths, investigating their meaning, and realizing them directly and experientially through meditative practice (bhāvanā). The object of the yogi’s enlightenment-realization is dharma and dharmin: The dharma is the true nature of real things, e.g., momentariness, while the dharmin is real things i.e., momentary things. During the practice of meditation, dharma is directly grasped in the process of clear manifestation (vi?adābhā) and the particular dharmin is indirectly ascertained in the process of determination (adhyavasāya). So, even though a yogi does not directly perceive any actual thing, s/he is still nonetheless able to undertake practical activity directed toward it. The realization of the Four Noble Truths consists of two aspects: firstly, the manifestation of momentariness, etc., in the stream of the yogi’s consciousness; secondly, the ascertainment of momentariness, etc., in whatever s/he happens to encounter.  相似文献   

20.
Technology transfer is the process by which technology originating at one institutional setting is adapted for use in another. A major impediment to the implementation of new technologies to assist with mangerial decision-making problems is a lack of communication between the technology and management communities. Development of a tool designed to bridge the technology transfer gap was the goal of this research. The result is a prototype software package which may be used on an interactive computer terminal by a manager for assistance in designing a decision support system (DSS). The four primary research tasks were:
  1. Develop a conceptual model of the DSS design process.
  2. Select and adapt, or create, appropriate software to mechanize the model.
  3. Develop a knowledge base to describe the interactiveness of various organization variables and managerial decision-making needs.
  4. Collect and analyze interview data and implement resultant production rules on the model.
Tasks 1 and 2 were accomplished first to establish the feasibility of this effort. An interview instrument was developed for Task 3. And, corporate managers from several firms were interviewed to accomplish Task 4. Using this data, a prototype production rule model (called DECAIDS for DECISION AIDS) was constructed which supports managerial decision-making from the EMYCIN production rule system used at Stanford University. The purpose of this article is to introduce the need for a Decision Support System Model. A complete copy of this research can be obtained through University Microfilms International, 300 N. Zeeb Road, Ann Arbor, Michigan 48106, from the Naval Postgraduate School, Monterey, California 93940, or the Defense Technical Information Center, Cameron Station, Alexandria, Virginia 22314. The title is “An Interactive Decision Support System for Technology Transfer Pertaining to Organization and Management”, 1980.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号