Web Sites and Chat Rooms Offer Pro-Anorexia Support

NASNewsletter ◽  
2002 ◽  
Vol 17 (1) ◽  
pp. 28-28
Author(s):  
Judith F. Harrigan
Keyword(s):  
2010 ◽  
pp. 2020-2028
Author(s):  
Kirk St. Amant

An individual’s personal information can be a valuable commodity to terrorists. With such data, terrorists can engage in a variety of illicit activities including creating false bank accounts, procuring various official documents or even creating mass panic. Unfortunately, such personal data is generally easy to access, exchange, or collect via online media including Web sites, chat rooms, or e-mails. Moreover, certain common business practices, particularly those related to data processing in international outsourcing, can facilitate such activities by placing personal information into a legal grey area that makes it easy to misuse. For these reasons, organizations and individuals need to be aware of the potential for such data misuse as well as be informed of steps they can take to curtail such abuses. This essay examines the privacy/data abuse problems related to international outsourcing and presents approaches designed to prevent the misuse of personal information by cyber terrorists.


Author(s):  
Ikuko Aoyama ◽  
Tony L. Talbert

Cyberbullying is a growing phenomenon among adolescents, teens, and young adults who either perpetrate and/or are the recipients of harassing and threatening behaviors through the use of technologies such as emails, Internet communities and social networking Web sites, chat rooms, and cell phones. The incidences of cyberbullying have increased predominantly among students who are residents of technologically advanced countries throughout North America, Europe, and Asia (Anderson & Sturm, 2007; Li, 2006). Several studies have shown that as many as 57% of school age students in the U.S. have experienced some types of cyber harassment (Cook, Williams, Guera & Tuthill, 2007; Hinduja & Patchin, 2005; Lenhart, 2007; Li, 2004). However, many schools and teachers may not fully be aware of the increase of cyberbullying and the psycho-emotional and physical problems that arise from both the perpetuation and the receipt of cyberbullying. The purpose of this chapter is to present the characteristics and theoretical frameworks that define and contextualize cyberbullying including the international prevalence and related statistics, backgrounds and profiles of perpetrators, and adults’ roles (Campbell, 2005; Cook, et al., 2007; Kennedy, 2005; Lenhart, 2007; Willard, 2005). This chapter will also provide educators and parents with prevention and intervention strategies to address cyberbullying among youth. Useful Web resources and additional readings are listed as well.


Author(s):  
Kirk St.Amant

An individual’s personal information can be a valuable commodity to terrorists. With such data, terrorists can engage in a variety of illicit activities including creating false bank accounts, procuring various official documents or even creating mass panic. Unfortunately, such personal data is generally easy to access, exchange, or collect via online media including Web sites, chat rooms, or e-mails. Moreover, certain common business practices, particularly those related to data processing in international outsourcing, can facilitate such activities by placing personal information into a legal grey area that makes it easy to misuse. For these reasons, organizations and individuals need to be aware of the potential for such data misuse as well as be informed of steps they can take to curtail such abuses. This essay examines the privacy/data abuse problems related to international outsourcing and presents approaches designed to prevent the misuse of personal information by cyber terrorists.


2005 ◽  
Vol 15 (1) ◽  
pp. 68-76 ◽  
Author(s):  
Marilyn A. Campbell

AbstractAlthough technology provides numerous benefits to young people, it also has a ‘dark side’, as it can be used for harm, not only by some adults but also by the young people themselves. E-mail, texting, chat rooms, mobile phones, mobile phone cameras and web sites can and are being used by young people to bully peers. It is now a global problem with many incidents reported in the United States, Canada, Japan, Scandinavia and the United Kingdom, as well as in Australia and New Zealand. This growing problem has as yet not received the attention it deserves and remains virtually absent from the research literature. This article explores definitional issues, the incidence and potential consequences of cyber bullying, as well as discussing possible prevention and intervention strategies.


2010 ◽  
Vol 43 (2) ◽  
pp. 727-751 ◽  
Author(s):  
Justin W. Patchin ◽  
Sameer Hinduja

Bullying at school is a common problem facing youth, school officials, and parents. A significant body of research has detailed the serious consequences associated with bullying victimization. Recently, however, a new permutation has arisen and arguably become even more problematic. Cyberbullying, as it has been termed, occurs when youth use technology as an instrument to harass their peers—via email, in chat rooms, on social networking Web sites, and with text messaging through their computer or cell phone. The current study seeks to shed light on the potential causes of both variants of adolescent aggression by employing the arguments of Agnew’s (1992) general strain theory as a guiding framework. Results suggest that those who experience strain are more likely to participate in both traditional and nontraditional forms of bullying. Implications of these findings and suggestions for further research in this growing area of study are also discussed.


2001 ◽  
Vol 6 (2) ◽  
pp. 6-8
Author(s):  
Christopher R. Brigham

Abstract The AMA Guides to the Evaluation of Permanent Impairment (AMA Guides), Fifth Edition, explains that independent medical evaluations (IMEs) are not the same as impairment evaluations, and the evaluation must be designed to provide the data to answer the questions asked by the requesting client. This article continues discussions from the September/October issue of The Guides Newsletter and examines what occurs after the examinee arrives in the physician's office. First are orientation and obtaining informed consent, and the examinee must understand that there is no patient–physician relationship and the physician will not provide treatment bur rather will send a report to the client who requested the IME. Many physicians ask the examinee to complete a questionnaire and a series of pain inventories before the interview. Typical elements of a complete history are shown in a table. An equally detailed physical examination follows a meticulous history, and standardized forms for reporting these findings are useful. Pain and functional status inventories may supplement the evaluation, and the examining physician examines radiographic and diagnostic studies. The physician informs the interviewee when the evaluation is complete and, without discussing the findings, asks the examinee to complete a satisfaction survey and reviews the latter to identify and rectify any issues before the examinee leaves. A future article will discuss high-quality IME reports.


Sign in / Sign up

Export Citation Format

Share Document