Results 51 to 60 of about 195,242 (187)

Do Predictive Brain Implants Threaten Patient's Autonomy or Authenticity? [PDF]

open access: yes, 2015
The development of predictive brain implant (PBI) technology that is able to forecast specific neuronal events and advise and/or automatically administer appropriate therapy for diseases of the brain raises a number of ethical issues.
Sarajlic, Eldar
core   +2 more sources

Determinants of Sexual Coercion Among Adolescents in Rivers State

open access: yesIbom Medical Journal
Introduction: Adolescents are especially susceptible to sexual coercion. The factors that may affect the adolescent risk of engaging in coercive sex in Rivers State need to be further understood.
Ogbonna VI   +3 more
doaj   +1 more source

College Students’ Perceptions of Barriers to Bystander Intervention [PDF]

open access: yes, 2017
Sexual violence is a major problem on college campuses and is associated with a range of negative health consequences for victims. Teaching students to intervene as prosocial bystanders has become a common element of sexual assault prevention efforts ...
Grych, John H., Yule, Kristen
core   +1 more source

Book review of "The Ethics of Coercion in Mass Casualty Medicine" by Griffin Trotter MD, PhD

open access: yesPhilosophy, Ethics, and Humanities in Medicine, 2007
Public health ethics is neither taught widely in medical schools or schools of public health in the US or around the world. It is not surprising that health care professionals are particularly challenged when faced with ethical questions which extend ...
Singh Sonal
doaj   +1 more source

A Woman’s Worth [PDF]

open access: yes, 2010
This Article examines three traditionally “taboo trades”: (1) the sale of sex, (2) compensated egg donation, and (3) commercial surrogacy. The Article purposely invokes examples in which the compensated provision of goods or services (primarily or ...
Krawiec, Kimberly D.
core   +1 more source

Researching the use of force: The background to the international project [PDF]

open access: yes, 2009
This article provides the background to an international project on use of force by the police that was carried out in eight countries. Force is often considered to be the defining characteristic of policing and much research has been conducted on the ...
A. Reiss   +85 more
core   +4 more sources

Towards a fragmented neighbourhood: policies of the EU and Russia and their consequences for the area that lies in between [PDF]

open access: yes, 2014
In the current volatile climate, the EU needs a strategy towards Russia that goes beyond sanctions. In reviewing the European Neighbourhood Policy and the Eastern Partnership, the EU’s incoming leadership should be more sensitive towards the existing ...
Delcour, Laure, Kostanyan, Hrant
core  

Perceived Coercion, Outpatient Commitment, and Reinvestment in Community Mental Health Programs [PDF]

open access: yesPsychiatric Services, 2016
Known by a variety of names—community treatment orders in the United Kingdom and other Commonwealth countries and involuntary outpatient commitment or assisted outpatient treatment here in the United States—court-mandated treatment has been examined closely in the pages of Psychiatric Services over the past three decades, and evidence of its ...
openaire   +2 more sources

Telecare for the elderly: coercion, confidence and satisfaction associated with its use

open access: yesRevista Brasileira de Geriatria e Gerontologia, 2018
Objective: to evaluate the expression of coercion, confidence and satisfaction with the use of telecare. Method: a cross-sectional study was carried out of prevalent cases with elderly residents in the city of Porto Alegre, Rio Grande do Sul, Brazil ...
Bruna Borba Neves, José Roberto Goldim
doaj   +2 more sources

Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]

open access: yes, 2009
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core   +4 more sources

Home - About - Disclaimer - Privacy