Online and offline peer led models against bullying and cyberbullying

Size: px
Start display at page:

Download "Online and offline peer led models against bullying and cyberbullying"

Transcription

1 Psicothema Vol. 24, nº 4, ISSN CODEN PSOTEG Coyright 2012 Psicothema Online and offline eer led models against bullying and cyberbullying Benedetta Emanuela Palladino, Annalaura Nocentini and Ersilia Menesini University of Florence (Italy) The aim of the resent study is to describe and evaluate an ongoing eer-led model against bullying and cyberbullying carried out with Italian adolescents. The evaluation of the roject was made through an exerimental design consisting of a re-test and a ost-test. Particiants in the study were 375 adolescents (20.3% males), enrolled in 9th to 13th grades. The exerimental grou involved 231 students with 42 eer educators, and the control grou involved 144 students. Results showed a significant decrease in the exerimental grou as comared to the control grou for all the variables excet for cyberbullying. Besides, in the exerimental grou we found a significant increase in adative coing strategies like roblem solving and a significant decrease in maladative coing strategies like avoidance: these changes mediate the changes in the behavioural variables. In articular, the decrease in avoidance redicts the decrease in victimization and cybervictimization for eer educators and for the other students in the exerimental classes whereas the increase in roblem solving redicts the decrease in cyberbullying only in the eer educators grou. Results are discussed following recent reviews on evidence based efficacy of eer led models. Modelos online y offl ine contra el acoso y el acoso cibernético realizados or ares. El objetivo del resente estudio es describir y evaluar un modelo conducido or ares contra el acoso y el acoso cibernético realizado con adolescentes italianos. La evaluación del royecto se realizó mediante un diseño exerimental que consiste en un re-test y un ost-test. Los articiantes en el estudio fueron 375 adolescentes (varones= 20,3%), matriculados en los grados El gruo exerimental envolvió 231 alumnos (42 ares educadores), y en el gruo de control articiaron 144 estudiantes. Los resultados mostraron una disminución significativa en el gruo exerimental en comaración con el gruo de control ara todas las variables, exceto ara cyberbullying. Además, en el gruo exerimental se encontró un aumento significativo de estrategias adatativas (roblem solving) y una disminución significativa en las estrategias de afrontamiento desadatativas como la evitación: estos cambios median los cambios en las variables de comortamiento. En articular, la disminución de la evitación redice la disminución de la victimización y cibervictimización en todo el gruo exerimental, mientras que el aumento de roblem solving redice la disminución de la ciber-intimidación solo en el gruo de ares educadores. Se discuten los resultados de acuerdo con las revisiones recientes sobre la eficacia, basada en la evidencia, de los modelos conducidos or ares. Cyberbullying is one of the most frequent risks related to ICT use by young eole. It has been defined as bullying eretrated by the use of electronic devices (Smith et al., 2008). Results from a recent meta-analysis show a high revalence of the roblem in all countries (Garaigordobil, 2011): aroximately, 40% and 55% of students are involved in some way (as victims, eretrators, or observers). In the face-to-face context, there are similar concerns. According to a recent Italian national study, u to 25.2% of all students have suffered some kind of victimization (AA.VV., 2011). These ercentages of involvement demand attention because research has highlighted that bullying is a significant risk factor for the hysical and sychological well-being of children and adolescents (e.g., in this Fecha receción: Fecha acetación: Corresondencia: Benedetta Emanuela Palladino Diartamento di Psicologia University of Florence Florence (Italy) benedetta_alladino@yahoo.it secial issue, Anderson & Hunter, 2012; del Rey, Elie, & Ortega, 2012; Heirman & Walrave, 2012; Wachs, Wolf, & Pan, 2012). From a recent meta-analysis (Ttofi, Farrington, Losel, & Loeber, 2011) we know that bullying is associated with externalizing and delinquent behaviours (Paul, Smith, & Blumberg, 2012; Vandebosch, Beirens, D Haese, Wegge, & Pabian, 2012) while being victimized is associated with the develoment of general sychological distress, increased levels of deression and anxiety (Arsenault, Bowes, & Shakoor, 2010) above and beyond revious sychological symtoms and other genetic, family and social risk factors. In addition, school bullying has a negative imact on bystanders and other children in the class (Gini, Pozzoli, Borghi, & Franzoni, 2008). Similarly, the growing literature about cyberbullying highlights the interconnection between online and offline bullying and similar trajectories for bullies and victims in the two contexts (Gradinger, Strohmeier, & Siel, 2009; Menesini, Calussi, & Nocentini, 2012). Given these results, the need for interventions to limit the harm caused by bullying and cyberbullying is clear and urgent. From a recent meta-analysis (Ttofi & Farrington, 2011) there is evidence of

2 ONLINE AND OFFLINE PEER LED MODELS AGAINST BULLYING AND CYBERBULLYING 635 the fact that revention models can be effective to contrast bullying and victimization and the most efficacious comonents being: discilinary methods, class and school rules, class management, awareness activities and arents training. On the contrary, working with eers showed controversial results. In articular, in the same meta-analysis (Ttofi & Farrington 2011) eer led models were associated with an increase in victimization. These authors exress the need for future research with a more rigorous design and higher methodological standards (Flay et al., 2005) along with theoretically grounded intervention models. In reviewing literature about intervention on cyberbullying we found that it is a relatively new tye of intervention and there is a aucity of studies on its effectiveness. One of these was carried out with Italian adolescents using a eer education aroach (Menesini & Nocentini, 2012). The evaluation of the efficacy highlighted a decrease in cyberbullying but mainly in a subgrou of articiants (male eer educators) and an increase in awareness of some rotective coing strategies. How can cybervictims handle a cyberbullying attack? Coing strategies useful to deal with cyberbullying are relevant to this regard. For examle, some victims may remove themselves from the website, stay offline, talk about their exerience with a friend or inform an adult about what they exerienced (Hinduja & Patchin, 2007). In England, uils aged 11 through 16 years suggested blocking/ avoiding messages and telling someone as the best coing strategies though many cybervictims had told nobody about it (Smith et al., 2008). Similar coing strategies were identified for different tyes of traditional bullying using interviews with uils in England and Jaan (Kanetsuna, Smith, & Morita, 2006). Although hel seeking was often recommended as the most effective coing strategy, we know that often uils do not do it sontaneously. Problem solving coing strategies and erceived eer normative ressure for bystanders are ositively associated with active hel towards a victim and negatively related to assivity (Pozzoli & Gini, 2010). Bullying is often considered a social tye of aggression because it involves a grou of eers in which each member lays a secific role. This grou dimension shows that the bystanders can otentially influence the situation in different ways: they can reinforce the bully, joining or assively acceting the situation, or conversely they can dissociate themselves from the bullies, defending the victims (Salmivalli, 2010). As otential targets of intervention, bystanders are easier to address as comared to bullies and victims because they often reort anti-bullying attitudes although they might have roblems to intervene directly. Literature on victims suort and on bystanders role has underlined the value of involving the grou and secifically uninvolved children, i.e. the so called silent majority to change the dynamics of bullying and to sto negative behaviors (Menesini, Codecasa, Benelli, & Cowie, 2003). Given that, an aroach focused on eer involvement aears to be relevant and suitable to be used for anti-bullying and anti-cyberbullying interventions. Peer education and eer suort models are based on the assumtion that eers learn from each other, have significant influence on each other, and that norms and behaviors are most likely to change when liked and trusted grou members take the lead in changing the situation (Maticka-Tyndale & Barnett 2010; Naylor & Cowie 1999; Turner & Sheherd, 1999). Starting from these considerations, the aim of the resent study is to describe and evaluate an ongoing eer-led model called Noncadiamointraola! (Let s not fall into the tra!) 2 nd edition, carried out with Italian adolescents. This intervention consists in both online and face-to-face activities to revent and contrast bullying and cyberbullying. In order to understand ossible mechanisms we will analyse the role of different coing strategies that can mediate the effects of the roject on bullying and cyberbullying behaviours. In articular, secific aims and hyotheses are: 1. We aim to evaluate if the exerimental grou and the control grou have a different change across time in relation to the target variables (bullying, cyberbullying, victimization and cybervictimization): to this regards we hyothesize a significant decrease of the target behaviours across time in the exerimental grou and a non-significant change in the control grou. 2. We aim to evaluate if both comonents of the exerimental grou (eer educators and the rest of the exerimental grou) have a different change across time in relation to the target variables (bullying, cyberbullying, victimization and cybervictimization) and to the rocess-mediating variables (coing strategies): to this regard we hyothesize a significant decrease of the target behaviours, a significant decrease of maladative coing strategies and a significant increase of adative strategies across time in both comonents of exerimental grou, although this change could be more consistent for the eer educators grou. 3. Finally, focusing on the exerimental grou, we aim to evaluate if the change in the target variables is affected by the change in the rocess-mediating variables: to this regard we hyothesize that the decrease in the target behaviour should be influenced by the increase in the adative and the decrease in the maladative coing strategies. Particiants Method Particiants in the study were 375 adolescents (males= 20.3%), enrolled in 9 th to 13 th grades of 4 high schools in Tuscany. 53.1% of the students attended Lyceum high schools, 31.5% Technical Institutes and 15.5% Vocational high schools. The majority of students were from Italian background (90.4%). The exerimental grou was comosed by 231 adolescents (Males= 15.4%; mean age= 16.8; SD= 1.92) attending 10 classes of 3 high schools. 42 students (Males= 23.8%) were enrolled as eer educators. Comared to the other students in the exerimental classes, they articiated in eer educators training. The control grou was comosed by students who did not receive any kind of intervention (N= 144; Males= 20.8%; mean age= 15.15; SD=.90). The schools were selected using a self-selection inclusion rocess and the classes were selected by the school staff. Self-reort questionnaires were administered in class by trained researchers during school time (in December 2010 and in May 2011). Consent rocedure for research consisted of aroval by the schools and consent by the arents: 100% of the families agreed to their children s articiation in the research. Instruments Outcome behaviours Bullying and Victimization. In order to analyze the involvement in bullying and victimization we used the Bullying and Victimization

3 636 BENEDETTA EMANUELA PALLADINO, ANNALAURA NOCENTINI AND ERSILIA MENESINI Scales (Menesini, Calussi, & Nocentini, 2012). This questionnaire is comosed by two scales: one for eretration and one for bullying received (victimization). Each scale consists of 11 items, asking how often adolescents had exerienced in the ast coule of months several behaviours as eretrators or victims (e.g. I threatened someone ; I beat and ushed ; I was threatened, I was beaten and ushed ). Each item was evaluated along a 5-oint scale from never to several times a week. Reliability coefficients showed accetable values: for bullying alhas were 0.75 at T1 and 0.82 at T2 and for victimization alhas were 0.74 at T1 and 0.71 at T2. A mean score was used in the following analyses. Cyberbullying and Cybervictimization. In order to evaluate cyberbullying and cybervictimization, a revised version of the Cyberbullying Scale (Menesini, Nocentini, & Calussi, 2011) was used. It is comosed by two scales, one for eretration and one for victimization. Each scale consists of 18 items, asking how often in the ast coule of months adolescents had exerienced several behaviours ( I sent with threats and insults ; or I received with threats and insults ). Each item was evaluated along a 5-oint scale from never to several times a week. Reliability coefficients showed accetable values: for cyberbullying alhas were 0.79 at T1 and 0.82 at T2 and for cybervictimization alhas were 0.80 at T1 and 0.87 at T2. A mean score was used in the following analyses. Process variables Coing strategies. In order to analyze the role of coing strategies as ossible mediators of the rogram efficacy, we used the Coing Strategy Indicator (Amirkhan, 1990). The CSI is a standardized measure which assesses general coing styles in the resence of stressful events. It consists of 33 items belonging to three scales that measure three different styles of coing: (a) Problem Solving Scale (T1 α=.85; T2 α=.85); (b) Seeking Social Suort (T1 α=.85; T2 α=.87); (c) Avoidance (T1 α=.69; T2 α=.69). A mean score was used in the following analyses. Procedure Noncadiamointraola is an ongoing intervention roject started in Each year it has been enriched by adding and modifying comonents following the results found in the revious editions. In Noncadiamointraola 2 nd edition we imroved the model: 1) aying stronger attention to the victim s role in each ste; 2) involving bystanders more; 3) working on coing strategies that adolescents may use in bullying and cyberbullying situations; 4) requesting greater collaboration of curricular teachers on secific class activities; 5) creating a facebook grou comlementing the webage forum. In articular, the second edition was carried out through the following stages: 1. Initial evaluation and needs analysis. 2. Launch of the roject and awareness develoing. Presentation of the roject and first communication on issues related to bullying and cyberbullying. 3. Selection of eer educators from each articiating class through self-nomination. 4. Day training for eer-educators (focussing on: communication, emathy, coing strategies and social skills in real and virtual interactions). 5. Face-to-face eer educator s activities: in each class the intervention was carried out in collaboration with teachers and its aim was to roduce a final roduct such as: a short movie, a eer counselling service, a new guideline for ICT use, a oster advertising the roject. 6. Online eer educators intervention was carried out for a eriod of two weeks as forum moderators (htt://www. squarciagola.net/cyberbullismo/) and as facebook grou administrators. 7. Final evaluation. Data analyses Analyses were conducted in three stes. First, we evaluated longitudinal differences (re and ost-intervention) in bullying, victimization, cyberbullying and cybervictimization between the control and exerimental grou by using reeated measures ANOVA. Effect size was evaluated using artial eta squared (η 2 ). Second, we focused on the exerimental grou differentiating eer educators and the other students of the exerimental classes. In articular, we evaluated differences in behaviours and differences in rocesses (coing strategies) that could be involved in this change, by using reeated measures ANOVA (re and ostintervention) between eer educators and the other students of exerimental classes. Unfortunately, due to schools difficulties we don t have the data on the coing strategies in the control grou. In order to analyze the relation between these changes in rocesses and the outcome behaviours we used the residualized change in a two-wave mediation model (MacKinnon, 2008). The first ste in the calculation of the residualized change score is to obtain redicted values of the ost-intervention measure by using the re-intervention measure. The residualized change score is the difference between the observed score at ost-intervention and the redicted score at ost-intervention, where the re-intervention measure was used to redict the ost-intervention measure. We obtained the residualized change scores searately for both the behaviours and the mediators (coing strategies) and they were analyzed as if there were a single measure of each variable. In order to evaluate the mediation role of the coing strategies in the changes of the behaviours we regressed the residualized change score of the coing strategies on the residualized change score of the behavioural variables, considering the interactions between the rocesses variables and the grous (eer educators or exerimental classes). Results Exerimental vs. Control grou: the intervention effects Table 1 shows descritive analyses for both grous in behavioural variables (re- and ost- intervention). Reeated measures ANOVA were carried out in order to evaluate the effect of time on these variables across the two grous. For bullying and victimization results showed no significant effect of time and a significant interaction time*grou for bullying (F (1, 375) = 5.993; <.05; η 2 =.016) and for victimization (F (1, 375) = ; <.01; η 2 =.031). For cyberbullying and cybervictimization, results showed a non-significant effect of time and a non-significant interaction time*grou for cyberbullying. For cybervictimization, results showed a significant interaction for time*grou (F (1, 375) = 5.706; <.05; η 2=.015).

4 ONLINE AND OFFLINE PEER LED MODELS AGAINST BULLYING AND CYBERBULLYING 637 Table 1 Means and standard deviations of the behavioral variables re and ost- intervention (Wave 1 and Wave 2) in the exerimental grou and in the control grou Exerimental grou Control grou Criterion Wave 1 Wave 2 Wave 1 Wave 2 Bullying M SD Victimization M SD Cyberbullying M SD Cybervictimization M SD Table 2 Means and standard deviations of the behavioral variables and of coing strategies re and ost- intervention (Wave 1 and Wave 2) in the exerimental grou (eer educators and the other students in the exerimental classes) Peer educators The other students in the exerimental classes Criterion Wave 1 Wave 2 Wave 1 Wave 2 Bullying M SD Victimization M SD Cybervictimization M SD Problem solving M SD Seeking social suort M SD Avoidance M SD Peer educators vs. the other students in the exerimental classes: changes and mediation analyses. Table 2 shows descritive analyses for both grous in behavioural variables (re and ost- intervention) and in rocess variables (coing strategies). We found significant effects of intervention in both grous in relation to behavioural and rocesses variables. Changes in behaviours: For the three variables results of reeated measures ANOVA showed a tendency to the significance of the effect of time for bullying (F (1, 231) = 3.453; =.06 ) and a significant effect of time for victimization (F ( 1, 231) = 4.178; <.05; η 2=.018) and cybervictimization (F = 8.919; <.01; (1, 231) η2 =. 037). Non-significant interaction effects for time*grou were found. Changes in rocesses: for the three coing variables, results of reeated measures ANOVA showed a significant effect of time for avoidance (F( 1, 228) = ; <.001; η 2 =.143) and roblem solving (F (1, 228) = 4.747; <.05; η 2 =.021) and a non-significant effect of time for seeking social suort. Non-significant interaction effects for time*grou were found. Mediation analyses We conducted three multile regression analyses with the residualized change score of bullying, victimization and cybervictimization as the deendent variable. Indeendent variables were the residualized change score of avoidance and roblem solving and the grou (eer educators or other students in the exerimental classes); finally, interaction between coing strategies and grou (eer educator vs. other students in the exerimental classes) was considered. In the model redicting bullying non significant redictors were found. Table 3 summarize results of the regression analyses on victimization and cybervictimization. The model redicting victimization was significant (R 2 = 0.32, F (5, 222) = 20.71, <0.001). The residualized change score of avoidance (B=.254, <.05) redicted ositively the residualized change score of victimization, meaning that a greater reduction in avoidance redicts a greater reduction in victimization. None of the interactions were significant above and beyond the main effects. The model redicting cybervictimization was significant (R 2 =0.19, F (5, 222) = , <0.001) and a significant effect of residualized change score of avoidance (B=.075, SE=.033, <.05) on the residualized change score of cybervictimization was found. We found also a significant interaction between grou and roblem solving (B=.056, SE= Table 3 R 2, B, standard errors (SE) and F resulted from the regression models Victimization Cybervictimization R² B SE F R² B SE F *** *** Grou -.023* **.006 Problem solving -.118* **.036 Avoidance -.254* **.033 Problem solving grou -.058* **.019 Avoidance grou -.004* **.018 Note: *<.05; **<.01; ***<.001

5 638 BENEDETTA EMANUELA PALLADINO, ANNALAURA NOCENTINI AND ERSILIA MENESINI.019, <.01). In order to interret this interaction we calculated the regression effects searately for the two grous, which showed that the change in roblem solving, for the other students in the exerimental classes (R 2 =0.08, F (2, 184) = 7.435, <0.01) controlling for avoidance (B= , SE= 0.008, <.001) didn t redict the change in cyberbullying (B=.000, SE= 0.006, ns). In contrast, for eer educators (R 2 = 0.51, F (2, 184) = , <0.001) the change in cybervictimization was negatively redicted by the change in roblem solving (B= , SE= 0.018, <.01), controlling for avoidance (B= 0.054, SE= 0.016, <.01): it means that for eer educators a greater increase in roblem solving redicts a greater decrease in cybervictimization. Discussion The resent study aimed to evaluate the effectiveness of the Noncadiamointraola 2 nd edition rogram. On the whole, the results give clear suort of the efficacy of this intervention: they show a significant attern of decrease in bullying, victimization and cybervictimization in the exerimental grou in comarison with the control grou (albeit the effect size is not very strong). Differently from the first edition (Menesini & Nocentini, 2012) we found effects in the whole exerimental classes without differences related to the roles layed by the students. In articular, the eer educators were able to be agents of change in their classes: they were not simly the direct beneficiaries of the intervention. These results are aarently in contrast with a metaanalysis on the effectiveness of school-based rograms to reduce bullying (Ttofi & Farrington, 2011). The authors suggested that this aroach is not useful. Probably this conclusion does not take into account that there are different comonents that can lay a role in the effectiveness of a rogram. The same authors found that the most imortant rogram elements that were associated with a decrease in victimization were also videos and cooerative grou work and we used them within the framework of a eer- led model. Besides, we can understand that within a eer education- eer suort model the tye of roles eer educators lay is highly relevant. If they undertake a rocess of ersonal change and cannot involve the other students, this aroach may have limited effects (Menesini & Nocentini, 2012). On the contrary, if they are suorted in their caacity to romote initiatives and active articiation of other students, the rocess of change can involve the entire class. The resent study also aimed to understand which rocesses could exlain the observed results. Starting from what students think about coing strategies (Hinduja & Patchin, 2007; Smith et al., 2008; Kanetsuna, Smith, & Morita, 2006) and from literature findings (Pozzoli & Gini, 2010) we decided to work intensively during the rogram on the coing strategies that could be used by victims and bystanders in order to tackle bullying and cyberbullying. We found a significant increase in the exerimental samle between re- and ost-intervention measures in the use of an adative coing strategy such as roblem solving and a significant decrease in a maladative coing strategy such as avoidance. Regression analyses show that these two strategies can mediate the efficacy of the rogram: the greater decrease in avoidance redicts the greater reduction in victimization and cybervictimization. This result is the same across grous (eer educators and the other students in the exerimental classes). Conversely, roblem solving is a mediator of the change in cybervictimization but only in the eer educators grou. We can seculate that it could be the effect of the secific training attended by eer educators. An unexected result we found was a non significant increase in seeking social suort as a ositive coing strategy desite our focus during the roject. Looking at descritive analyses (table 2), we can see that there is an increasing though not significant - trend in both grous. Probably, we can hyothesize that it is easier to change coing strategies that deend on individuals such as roblem solving or avoidance. On the contrary, in order to adot a coing strategy based on seeking social suort an individual needs first to be able to trust other eole of his/her social contest, rocess that we were not able to catch in the time length of the intervention. Coing strategies are not involved in mediating the reduction in bullying. This is not a surrising finding because we exected that other individual and contextual variables (e.g. attitudes, beliefs and moral disengagement) lay a role to this regard. We also did not work directly on this role but we focussed more on victims and bystanders. Further analyses are needed to understand if the efficacy of the roject in reducing bullying was caused by an increase in defending behaviours acted by the bystanders. In suort of this hyothesis, we can seculate that in our exerimental grou there was an increase in roblem solving and we know that this strategy is ositively associated with active hel towards the victims and negatively related to assive roles (Pozzoli & Gini, 2010). Finally, some limitations of the study have to be discussed: 1) in terms of method, we did not follow u the outcomes after a few months, while we know that it is imortant to determine the stability of changes according to the standards of evidence of revention science (Flay et al., 2005); 2) the analyses on mediational rocesses are restricted to the exerimental grou because we didn t have data about coing strategies for the control grou: the control schools didn t allow us to administer the comlete set of questionnaires. However, the changes in the coing strategies show how these rocesses can affect bullying and cyberbullying similarly or differently across the two sub-grous: eer educators and the other students of the exerimental classes; 3) we don t have a lacebo grou and a randomized control trial because schools decided to take art in the intervention and we tried to find a control grou with similar characteristics. Desite these limitations, the resent study integrates revious knowledge and gives some relevant suggestions to researchers and ractitioners working on bullying and cyberbullying. In articular, starting from the standards of evidence as defined by international research (Flay et al., 2005), we evaluated the efficacy of a roject highlighting different comonents that can exlain a reduction of the henomenon, and we focused on ossible mechanisms resonsible for changes and/or the stability of the roblem. Acknowledgments The authors wish to thank the Province of Lucca for the financial suort at the roject and the schools, teachers and students for their collaboration.

6 ONLINE AND OFFLINE PEER LED MODELS AGAINST BULLYING AND CYBERBULLYING 639 References AA. VV. (2011). Indagine conoscitiva sulla condizione dell infanzia e dell adolescenza in Italia 2011 (Survey on Childhood and Adolescence Condition in Italy). Rome: Eurises, Telefono Azzurro. Amirkhan, J.H. (1990). A factor analytically derived measure of coing: The coing strategy indicator. Journal of Personality and Social Psychology, 59(5), Anderson, S., & Hunter, S.C. (2012). Cognitive araisals, emotional reactions, and their associations with three forms of eer-victimization. Psicothema, 24, Arseneault, L., Bowes, L., & Shakoor, S. (2010). Bullying victimization in youths and mental health roblems: Much ado about nothing? Psychological Medicine, 40(5), del Rey, R., Elie, P., & Ortega, R. (2012). Bullying and cyberbullying: Overlaing and redictive value of the co-occurrence. Psicothema, 24, Flay, B.R., Biglan, A., Boruch, R.F., Castro, F.G., Gottfredson, D., Kellam, S., Moscicki, E.K., Schinke, S., Valentin, J.C., & Ji, P. (2005). Standards of evidence: Criteria for efficacy, effectiveness and dissemination. Prevention Science, 6(3), Garaigordobil, M. (2011). Prevalencia y consecuencias del cyberbullying: una revision. International Journal of Psychology and Psychological Theray, 11(2), Gini, G., Pozzoli, T., Borghi, F., & Franzoni, L. (2008). The role of bystanders in students ercetion of bullying and sense of safety. Journal of School Psychology, 46(6), Gradinger, P., Strohmeier, D., & Siel, C. (2009). Traditional bullying and cyberbullying. Identification of risk grous for adjustment roblems. Zeitschrift fur Psychologie, Journal of Psychology, 217(4), Heirman, W., & Walrave, M. (2012). Predicting adolescent eretration in cyberbullying: An alication of the theory of lanned behavior. Psicothema, 24, Hinduja, S., Patchin, J.W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), Kanetsuna, T., Smith, P.K., & Morita, Y. (2006). Coing with bullying at school: Children s recommended strategies and attitudes to schoolbased interventions in England and Jaan. Aggressive Behavior, 32(6), MacKinnon, D.P. (2008). Introduction to statistical mediation analysis. Mahwah, NJ: Lawrence Erlbaum Associates. Maticka-Tyndale, E., & Penwell Barnett, P.J. (2010). Peer-led interventions to reduce HIV risk of youth: A review. Evaluation and Program Planning, 33(2), Menesini, E., Calussi, P., & Nocentini, A. (2012). Cyberbullying and traditional bullying: Unique, additive and synergistic effects on sychological health symtoms. In Cyberbullying in the Global Playground: Research from international ersectives, ed. Qing Li, Donna Cross, and Peter K. Smith ( ). Oxford: Wiley- Blackwell. Menesini, E., Codecasa, E., Benelli, B., & Cowie, H. (2003). Enhancing Children s resonsability to take action against bullying. Evaluation of a befriending Intervention in Italian middle schools. Aggressive Behavior, 29(1), Menesini, E., & Nocentini, A. (2012). Peer education intervention: Face-to-face versus online. In A. Costabile & B. Sears, The imact of technology on relationshis in educational settings ( ), London: Routledge. Menesini, E., Nocentini, A., & Calussi, P. (2011). The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cybersychology, Behavior, and Social Networking, 14(5), Naylor, P., & Cowie, H. (1999). The effectiveness of eer suort systems in challenging school bullying: The ersectives and the exeriences of teachers and uils. Journal Of Adolescence, 22(4), Paul, S., Smith, P.K., & Blumberg, H.H. (2012). Investigating legal asects of cyberbullying. Psicothema, 24, Pozzoli, T., & Gini, G. (2010). Active defending and assive bystanding behavior in bullying: The role of ersonal characteristics and erceived eer ressure. Journal Abnormal Child Psychology, 38(6), Salmivalli, C. (2010). Bullying and the eer grou: A review. Aggression and Violent Behavior, 15(2), Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tiett, N. (2008). Cyberbullying: Its nature and imact in secondary school uils. The Journal Of Child Psychology And Psychiatry, 49(4), Ttofi, M., & Farrington, D.P. (2011). Effectiveness of school-based rograms to reduce bullying: A systematic and meta-analytic review. Journal Of Exerimental Criminology, 7, Ttofi, M., Farrington, D.P., Losel F., & Loeber, R. (2011). The redictive efficiency of school bullying versus later offeding: A systematic/metaanalytic review of longitudinal studies. Criminal Behavior and Mental Health, 21(2), Turner, G., & Sheherd, J. (1999). A method in search of a theory: Peer education and health romotion. Health Education Research, 14(2), Vandebosch, H., Beirens, L., D Haese, W., Wegge, D., & Pabian, S. (2012). Police actions with regard to cyberbullying: The Belgian case. Psicothema, 24, Wachs, S., Wolf, K.D., & Pan, C. (2012). Cybergrooming: Risk factors, coing strategies and associations with cyberbullying. Psicothema, 24,

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Analysis of Effectiveness of Web based E- Learning Through Information Technology

Analysis of Effectiveness of Web based E- Learning Through Information Technology International Journal of Soft Comuting and Engineering (IJSCE) Analysis of Effectiveness of Web based E- Learning Through Information Technology Anand Tamrakar, Kamal K. Mehta Abstract-Advancements of

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

The Advantage of Timely Intervention

The Advantage of Timely Intervention Journal of Exerimental Psychology: Learning, Memory, and Cognition 2004, Vol. 30, No. 4, 856 876 Coyright 2004 by the American Psychological Association 0278-7393/04/$12.00 DOI: 10.1037/0278-7393.30.4.856

More information

Online mindfulness training for chronic pain

Online mindfulness training for chronic pain Online mindfulness training for chronic ain - a randomized controlled trial Jessica Henriksson and Emma Vasara Möller Ht 013 Psykologrogrammet Examensarbete, 30h Handledare: Michael Rönnlund Tack! Vi vill

More information

Participation in Farm Markets in Rural Northwest Pakistan: A Regression Analysis

Participation in Farm Markets in Rural Northwest Pakistan: A Regression Analysis Pak. J. Commer. Soc. Sci. 2012 Vol. 6 (2), 348-356 Particiation in Farm Markets in Rural Northwest Pakistan: A Regression Analysis Inayatullah Jan Assistant Professor of Rural Develoment, Institute of

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Prevention and Intervention for Bullying, Victimization, and Related Issues Prevention

Prevention and Intervention for Bullying, Victimization, and Related Issues Prevention 1 Prevention and Intervention for Bullying, Victimization, and Related Issues Prevention Barton, E. A. (2006). Bully prevention: Tips and strategies for school leaders and classroom teachers (2 nd ed.).

More information

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter

More information

Learner and Instructional Factors Influencing Learning Outcomes within a Blended Learning Environment

Learner and Instructional Factors Influencing Learning Outcomes within a Blended Learning Environment Lim, D. H., & Morris, M. L. (2009). Learner and Instructional Factors Influencing Outcomes within a Blended Environment. Educational Technology & Society, 12 (4), 282 293. Learner and Instructional Factors

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

PSYCHOLOGICAL RESISTANCE AGAINST ATTEMPTS TO REDUCE PRIVATE CAR USE

PSYCHOLOGICAL RESISTANCE AGAINST ATTEMPTS TO REDUCE PRIVATE CAR USE Pergamon Transn Res.-A, Vol. 32, No. 3,. 171±181, 1998 # 1998 Elsevier Science Ltd All rights reserved. Printed in Great Britain 0965-8564/98 $19.00+0.00 PII: S0965-8564(97)00006-2 PSYCHOLOGICAL RESISTANCE

More information

On-the-Job Search, Work Effort and Hyperbolic Discounting

On-the-Job Search, Work Effort and Hyperbolic Discounting On-the-Job Search, Work Effort and Hyerbolic Discounting Thomas van Huizen March 2010 - Preliminary draft - ABSTRACT This aer assesses theoretically and examines emirically the effects of time references

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Prediction of Treatment Outcome by Prae-Treatment Eating Characteristics in Overweight Children

Prediction of Treatment Outcome by Prae-Treatment Eating Characteristics in Overweight Children Rerinted from the German Journal of Psychiatry htt://www.gjsy.uni-goettingen.de ISSN 1433-1055 Prediction of Treatment Outcome by Prae-Treatment Eating Characteristics in Over Children Reinhold G. Laessle

More information

THE EFFECTS OF PARENTAL ANXIETY AND MEDICATION ATTITUDES ON THE USE OF PAIN MEDICATION IN PEDIATRIC CANCER PATIENTS

THE EFFECTS OF PARENTAL ANXIETY AND MEDICATION ATTITUDES ON THE USE OF PAIN MEDICATION IN PEDIATRIC CANCER PATIENTS THE EFFECTS OF PARENTAL ANXIETY AND MEDICATION ATTITUDES ON THE USE OF PAIN MEDICATION IN PEDIATRIC CANCER PATIENTS Narvaez, Vincent Reginald F. Deartment of Anesthesiology Michelle A. Fortier, Ph.D. Parents

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

GLOBAL EMPLOYMENT TRENDS FOR YOUTH 2012

GLOBAL EMPLOYMENT TRENDS FOR YOUTH 2012 GLOBAL EMPLOYMENT TRENDS FOR YOUTH 2012 +0.1 +2.03 +0.04-25.301 023-00.22 006.65 0.887983 +1.922523006.62-0.657987 +1.987523006.82-006.65 +0.1 0.887987 +1.987523006.60 0.887987 +2.03 +1.0075230.887984

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

A survey of health related quality of life (hrql) in children with

A survey of health related quality of life (hrql) in children with Borgis A survey of health related quality of life (hrql) in children with cerebral alsy *Lechosław P. Chmielik 1, Anna Chmielik 2, 3 1 Deartment of Pediatric ENT, Medical University of Warsaw, Poland Head

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

RETAIL INDUSTRY. Shaping the Customer s Experience: How Humans Drive Retail Sales in a Ferocious Economy

RETAIL INDUSTRY. Shaping the Customer s Experience: How Humans Drive Retail Sales in a Ferocious Economy RETAIL INDUSTRY Shaing the Customer s Exerience: How Humans Drive Retail Sales in a Ferocious Economy Who Energizes Customer Exerience Management? Senior Executives define the retail strategy with strategic

More information

physical therapy Faculty Ed Barakatt, Bryan Coleman-Salgado, Rafael Escamilla, Clare Lewis, Susan McGinty, Brad Stockert

physical therapy Faculty Ed Barakatt, Bryan Coleman-Salgado, Rafael Escamilla, Clare Lewis, Susan McGinty, Brad Stockert hysical theray master of hysical theray certificate of clinical cometency Program Descrition The mission of the Sacramento State Deartment of Physical Theray is to educate cometent hysical theraist generalist

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

ADOLESCENTS RIDING MOPEDS COMPARED TO ADOLESCENTS RIDING LIGHT MOTORCYCLES

ADOLESCENTS RIDING MOPEDS COMPARED TO ADOLESCENTS RIDING LIGHT MOTORCYCLES Issue 2 2011 Article 7 VOL 15 ADOLESCENTS RIDING MOPEDS COMPARED TO ADOLESCENTS RIDING LIGHT MOTORCYCLES OVE NJÅ University of Stavanger ABSTRACT Powered two wheelers (PTW) are categorised into moeds,

More information

Project Finance as a Risk- Management Tool in International Syndicated Lending

Project Finance as a Risk- Management Tool in International Syndicated Lending Discussion Paer No. 183 Project Finance as a Risk Management Tool in International Syndicated ending Christa ainz* Stefanie Kleimeier** December 2006 *Christa ainz, Deartment of Economics, University of

More information

Applications of Regret Theory to Asset Pricing

Applications of Regret Theory to Asset Pricing Alications of Regret Theory to Asset Pricing Anna Dodonova * Henry B. Tiie College of Business, University of Iowa Iowa City, Iowa 52242-1000 Tel.: +1-319-337-9958 E-mail address: anna-dodonova@uiowa.edu

More information

psychology Specializations MA: Counseling / Industrial-Organizational Psychology / Doctoral Preparation

psychology Specializations MA: Counseling / Industrial-Organizational Psychology / Doctoral Preparation sychology sychology bachelor of arts minor certificate master of arts Program Descrition Psychology is the scientific study of human and animal behavior, cognition, and emotion. It is a broad disciline

More information

The Changing Wage Return to an Undergraduate Education

The Changing Wage Return to an Undergraduate Education DISCUSSION PAPER SERIES IZA DP No. 1549 The Changing Wage Return to an Undergraduate Education Nigel C. O'Leary Peter J. Sloane March 2005 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study

More information

STILL LOST IN TRANSLATION. City Agencies Compliance with Local Law 73 and Executive Order 120: Examining Progress and Work Still to be Done

STILL LOST IN TRANSLATION. City Agencies Compliance with Local Law 73 and Executive Order 120: Examining Progress and Work Still to be Done STILL LOST IN TRANSLATION City Agencies Comliance with Local Law 73 and Executive Order 12: Examining Progress and Work Still to be Done Reort by: Make the Road New York & the New York Immigration Coalition

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

for UK industrial and scientific companies managed by Business Marketing Online

for UK industrial and scientific companies managed by Business Marketing Online for UK industrial and scientific comanies managed by Business Marketing Online This is a Google AdWords advertisement and so is this... and so is this......advertising with Google Adwords is now essential.

More information

THE HEBREW UNIVERSITY OF JERUSALEM

THE HEBREW UNIVERSITY OF JERUSALEM האוניברסיטה העברית בירושלים THE HEBREW UNIVERSITY OF JERUSALEM FIRM SPECIFIC AND MACRO HERDING BY PROFESSIONAL AND AMATEUR INVESTORS AND THEIR EFFECTS ON MARKET By ITZHAK VENEZIA, AMRUT NASHIKKAR, and

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Subjective and Objective Caregiver Burden in Parkinson s Disease

Subjective and Objective Caregiver Burden in Parkinson s Disease Journal of Korean Academy of Nursing (2007) Vol. 37, No. 2, 242 248 Subjective and Objective Caregiver Burden in Parkinson s Disease Kim, Keum Soon, RN, PhD 1, Kim, Bog Ja, RN, PhD 2, Kim, Kyung Hee, RN,

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Business Development Services and Small Business Growth in Bangladesh

Business Development Services and Small Business Growth in Bangladesh Universal Journal of Industrial and Business Management 1(2): 54-61, 2013 DOI: 10.13189/ujibm.2013.010206 htt://www.hrub.org Business Develoment Services and Small Business Growth in Bangladesh Md. Serazul

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

IMPROVING NAIVE BAYESIAN SPAM FILTERING

IMPROVING NAIVE BAYESIAN SPAM FILTERING Master Thesis IMPROVING NAIVE BAYESIAN SPAM FILTERING Jon Kågström Mid Sweden University Deartment for Information Technology and Media Sring 005 Abstract Sam or unsolicited e-mail has become a major roblem

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

5 A recent paper by Courbage and Zweifel (2011) suggests to look at intra-family moral

5 A recent paper by Courbage and Zweifel (2011) suggests to look at intra-family moral Introduction Long-term care has been increasingly becoming a "hot" toic over the last years, and its imortance is redicted to grow even more in the coming decades. Long-term care is the care for eole who

More information

Managing diabetes in primary care: how does the configuration of the workforce affect quality of care?

Managing diabetes in primary care: how does the configuration of the workforce affect quality of care? Managing diabetes in rimary care: how does the configuration of the workforce affect quality of care? Deartment of Health Policy Research Programme, ref. 016/0058 Trevor Murrells Jane Ball Jill Maben Gerry

More information

Expert Systems with Applications

Expert Systems with Applications Exert Systems with Alications 38 (2011) 11984 11997 Contents lists available at ScienceDirect Exert Systems with Alications journal homeage: www.elsevier.com/locate/eswa Review On the alication of genetic

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

When designing their products, companies often choose

When designing their products, companies often choose Jack of All Trades or Master of One? Product Differentiation and Comensatory Reasoning in Consumer Choice ALEXANDER CHERNEV* This research examines consumer reactions to two common ositioning strategies:

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Normally Distributed Data. A mean with a normal value Test of Hypothesis Sign Test Paired observations within a single patient group

Normally Distributed Data. A mean with a normal value Test of Hypothesis Sign Test Paired observations within a single patient group ANALYSIS OF CONTINUOUS VARIABLES / 31 CHAPTER SIX ANALYSIS OF CONTINUOUS VARIABLES: COMPARING MEANS In the last chater, we addressed the analysis of discrete variables. Much of the statistical analysis

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Pinhole Optics. OBJECTIVES To study the formation of an image without use of a lens.

Pinhole Optics. OBJECTIVES To study the formation of an image without use of a lens. Pinhole Otics Science, at bottom, is really anti-intellectual. It always distrusts ure reason and demands the roduction of the objective fact. H. L. Mencken (1880-1956) OBJECTIVES To study the formation

More information

New Approaches to Idea Generation and Consumer Input in the Product Development

New Approaches to Idea Generation and Consumer Input in the Product Development New roaches to Idea Generation and Consumer Inut in the Product Develoment Process y Olivier Toubia Ingénieur, Ecole Centrale Paris, 000 M.S. Oerations Research, Massachusetts Institute of Technology,

More information

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation Pressure Dro in Air Piing Systems Series of Technical White Paers from Ohio Medical Cororation Ohio Medical Cororation Lakeside Drive Gurnee, IL 600 Phone: (800) 448-0770 Fax: (847) 855-604 info@ohiomedical.com

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

NBER WORKING PAPER SERIES HOW MUCH OF CHINESE EXPORTS IS REALLY MADE IN CHINA? ASSESSING DOMESTIC VALUE-ADDED WHEN PROCESSING TRADE IS PERVASIVE

NBER WORKING PAPER SERIES HOW MUCH OF CHINESE EXPORTS IS REALLY MADE IN CHINA? ASSESSING DOMESTIC VALUE-ADDED WHEN PROCESSING TRADE IS PERVASIVE NBER WORKING PAPER SERIES HOW MUCH OF CHINESE EXPORTS IS REALLY MADE IN CHINA? ASSESSING DOMESTIC VALUE-ADDED WHEN PROCESSING TRADE IS PERVASIVE Robert Kooman Zhi Wang Shang-Jin Wei Working Paer 14109

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Ambiguity, Risk and Earthquake Insurance Premiums: An Empirical Analysis. Toshio FUJIMI, Hirokazu TATANO

Ambiguity, Risk and Earthquake Insurance Premiums: An Empirical Analysis. Toshio FUJIMI, Hirokazu TATANO 京 都 大 学 防 災 研 究 所 年 報 第 49 号 C 平 成 8 年 4 月 Annuals 6 of Disas. Prev. Res. Inst., Kyoto Univ., No. 49 C, 6 Ambiguity, Risk and Earthquake Insurance Premiums: An Emirical Analysis Toshio FUJIMI, Hirokazu

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Fundamental Concepts for Workflow Automation in Practice

Fundamental Concepts for Workflow Automation in Practice Fundamental Concets for Workflow Automation in Practice Stef Joosten and Sjaak Brinkkemer Centre for Telematics and Information Technology, University of Twente, The Netherlands March 12, 1995 This aer

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

ANALYSIS OF THE RELATIONSHIP BETWEEN EMOTIONAL INTELLIGENCE AND STRESS CAUSED BY THE ORGANISATION: A STUDY OF NURSES

ANALYSIS OF THE RELATIONSHIP BETWEEN EMOTIONAL INTELLIGENCE AND STRESS CAUSED BY THE ORGANISATION: A STUDY OF NURSES 334 Business Intelligence Journal July ANALYSIS O THE RELATIONSHIP BETWEEN EMOTIONAL INTELLIGENCE AND STRESS CAUSED BY THE ORGANISATION: A STUDY O NURSES Zeyne Kalyoncu Hacettee University, aculty of Economics

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

Efficient Partitioning of Memory Systems and Its Importance for Memory Consolidation

Efficient Partitioning of Memory Systems and Its Importance for Memory Consolidation Efficient Partitioning of Memory Systems and Its Imortance for Memory Consolidation Alex Roxin 1,2, Stefano Fusi 1 * 1 Center for Theoretical Neuroscience, Columbia University, New York, New York, United

More information

The predictability of security returns with simple technical trading rules

The predictability of security returns with simple technical trading rules Journal of Emirical Finance 5 1998 347 359 The redictability of security returns with simle technical trading rules Ramazan Gençay Deartment of Economics, UniÕersity of Windsor, 401 Sunset, Windsor, Ont.,

More information

SMALL BUSINESS GRANTS PROGRAM GUIDELINES

SMALL BUSINESS GRANTS PROGRAM GUIDELINES SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the

More information

4. Influence of Temperature and Pressure on Chemical Changes

4. Influence of Temperature and Pressure on Chemical Changes 4. Influence of Temerature and Pressure on Chemical Changes Toic: The influence of temerature and ressure on the chemical otential and drive and therefore the behaviour of substances. 4.1 Introduction

More information

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,

More information

Dynamics of Open Source Movements

Dynamics of Open Source Movements Dynamics of Oen Source Movements Susan Athey y and Glenn Ellison z January 2006 Abstract This aer considers a dynamic model of the evolution of oen source software rojects, focusing on the evolution of

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

The HIV Epidemic: What kind of vaccine are we looking for?

The HIV Epidemic: What kind of vaccine are we looking for? adia Abuelezam MATH 181 May 5, 2008 The HIV Eidemic: What kind of vaccine are we looking for? 1 Problem Background 33.2 million eole are living with HIV and AIDS worldwide [4]. Human Immunodeficiency Virus

More information

401K Plan. Effective January 1, 2014

401K Plan. Effective January 1, 2014 401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment

More information

What Makes an Effective Coalition?

What Makes an Effective Coalition? MARCH 2011 What Makes an Effective Coalition? Evidence-Based Indicators of Success Funded by and reared for: TCC Grou Team and Acknowledgements This aer was reared by Jared Raynor with extensive research

More information

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information