scholarly journals The Third Party: Healing Eating Disorders Through a Task Model of Couples Therapy

2019 ◽  
Vol 6 (2) ◽  
pp. 69
Author(s):  
Frani Pollack ◽  
Fran Gerstein

Couples therapy is often overlooked in the treatment of eating disorders yet provides a vital role in healing and recovery. In this article we propose a four-step-task model for couples therapy when the female partner has an eating disorder. This psychodynamic model includes narrative techniques to convey pertinent personal history, attachment work, parts work, and shared communication of emotion. The article describes the composite model and details the four steps.

2012 ◽  
Vol 28 (1) ◽  
pp. 25-31 ◽  
Author(s):  
Paula Elosua ◽  
Alicia López-Jáuregui

In this study the Eating Disorder Inventory-3 was adapted to Spanish and analyzed the internal psychometric properties of the test in a clinical sample of females with eating disorders. The results showed a high internal consistency of the scores as well as high temporal stability. The factor structure of the scale composites was analyzed using confirmatory factor analysis. The results supported the existence of a second-order structure beyond the psychological composites. The second-order factor showed high correlation with the factor related to eating disorders. Overall, the Spanish version of the EDI-3 showed good psychometric qualities in terms of internal consistency, temporal stability and internal structure.


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Moeed Yusuf

This book is the first to theorize third party mediation in crises between regional nuclear powers. Its relevance flows from two of the most significant international developments since the end of the Cold War: the emergence of regional nuclear rivalries; and the shift from the Cold War’s bipolar context to today’s unipolar international setting. Moving away from the traditional bilateral deterrence models, the book conceptualizes crisis behavior as “brokered bargaining”: a three-way bargaining framework where the regional rivals and the ‘third party’ seek to influence each other to behave in line with their crisis objectives and in so doing, affect each other’s crisis behavior. The book tests brokered bargaining theory by examining U.S.-led crisis management in South Asia, analyzing three major crises between India and Pakistan: the Kargil conflict, 1999; the 2001-02 nuclear standoff; and the Mumbai crisis, 2008. The case studies find strong evidence of behavior predicted by the brokered bargaining framework. They also shed light on several risks of misperceptions and inadvertence due to the challenges inherent in signaling to multiple audiences simultaneously. Traditional explanations rooted in bilateral deterrence models do not account for these, leaving a void with serious practical consequences, which the introduction of brokered bargaining seeks to fill. The book’s findings also offer lessons for crises on the Korean peninsula, between China and India, and between potential nuclear rivals in the Middle East.


Author(s):  
Chen Lei

This chapter examines the position of third party beneficiaries in Chinese law. Article 64 of the Chinese Contract Law states that where a contract for the benefit of a third party is breached, the debtor is liable to the creditor. The author regards this as leaving unanswered the question of whether the thirdparty has a right of direct action against the debtor. One view regards the third party as having the right to sue for the benefit although this right was ultimately excluded from the law. Another view, supported by the Supreme People’s Court, is that Article 64 does not provide a right of action for a third party and merely prescribes performance in ‘incidental’ third party contracts. The third view is that there is a third party right of action in cases of ‘genuine’ third party contracts but courts are unlikely to recognize a third party action where the contract merely purports to confer a benefit on the third party.


Author(s):  
Ly Tayseng

This chapter gives an overview of the law on contract formation and third party beneficiaries in Cambodia. Much of the discussion is tentative since the new Cambodian Civil Code only entered into force from 21 December 2011 and there is little case law and academic writing fleshing out its provisions. The Code owes much to the Japanese Civil Code of 1898 and, like the latter, does not have a requirement of consideration and seldom imposes formal requirements but there are a few statutory exceptions from the principle of freedom from form. For a binding contract, the agreement of the parties is required and the offer must be made with the intention to create a legally binding obligation and becomes effective once it reaches the offeree. The new Code explicitly provides that the parties to the contract may agree to confer a right arising under the contract upon a third party. This right accrues directly from their agreement; it is not required that the third party declare its intention to accept the right.


Author(s):  
Sheng-Lin JAN

This chapter discusses the position of third party beneficiaries in Taiwan law where the principle of privity of contract is well established. Article 269 of the Taiwan Civil Code confers a right on the third party to sue for performance as long as the parties have at least impliedly agreed. This should be distinguished from a ‘spurious contract’ for the benefit of third parties where there is no agreement to permit the third party to claim. Both the aggrieved party and the third party beneficiary can sue on the contract, but only for its own loss. The debtor can only set off on a counterclaim arising from its legal relationship with the third party. Where the third party coerces the debtor into the contract, the contract can be avoided, but where the third party induces the debtor to contract with the creditor by misrepresentation, the debtor can only avoid the contract if the creditor knows or ought to have known of the misrepresentation.


Sign in / Sign up

Export Citation Format

Share Document