[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (651)

Search Parameters:
Keywords = perpetrator

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 748 KiB  
Article
Cyberbullying Perpetration and Socio-Behavioral Correlates in Italian and Spanish Preadolescents: A Cross-National Study and Serial Mediation Analysis
by Gianluca Mariano Colella, Rocco Carmine Servidio, Anna Lisa Palermiti, Maria Giuseppina Bartolo, Paula García-Carrera, Rosario Ortega-Ruiz and Eva M. Romera
Int. J. Environ. Res. Public Health 2025, 22(3), 389; https://doi.org/10.3390/ijerph22030389 - 7 Mar 2025
Abstract
The spread of information and communication technologies (ICTs) has brought advantages and disadvantages, particularly impacting youth, who use the Internet and social media applications daily. In preadolescents’ social development, problematic social media use (PSMU) and cyberbullying (CB) are potential risk factors across several [...] Read more.
The spread of information and communication technologies (ICTs) has brought advantages and disadvantages, particularly impacting youth, who use the Internet and social media applications daily. In preadolescents’ social development, problematic social media use (PSMU) and cyberbullying (CB) are potential risk factors across several countries. PSMU is defined as the lack of regulation of social media platforms that is associated with negative outcomes in everyday life, while CB refers to using digital technology to harass, threaten, or embarrass another person. Among preadolescents, CB perpetration is frequently associated with cybervictimization (CV) experiences. The underlying mechanisms that drive this relationship have received limited attention. The aim of the cross-national comparative study, rooted in the general aggression model, is to investigate the direct and indirect effects between cyberbullying perpetration and cybervictimization, testing a model involving PSMU and moral disengagement (MD) as serial mediators in this association. A total of 895 Italian and Spanish preadolescents (Mage = 11.23, SDage = 1.064) completed a self-report survey during school hours. Descriptive statistics were computed, and a serial mediation model was run. The results show that CV is positively associated with CB, and that PSMU and MD positively serially mediate the CV–CB link. This study’s insights suggest the need for tailored educational interventions targeting European youth, to promote more positive online social interactions and a safer digital environment. Full article
Show Figures

Figure 1

Figure 1
<p>Theoretical model of serial mediation effects, linking cybervictimization and cyberbullying through the serial mediating actions of PSMU and MD.</p>
Full article ">Figure 2
<p>Non-standardized estimate results from the serial mediating research model. ** <span class="html-italic">p</span> &gt; 0.001.</p>
Full article ">
14 pages, 288 KiB  
Article
I’m Not That Person: A Qualitative Study of Moral Injury in Forensic Psychiatric Patients
by Sarah K. Atkey, Krystle Martin, Karen D. Fergus and Joel O. Goldberg
Int. J. Environ. Res. Public Health 2025, 22(3), 372; https://doi.org/10.3390/ijerph22030372 - 3 Mar 2025
Viewed by 150
Abstract
Few studies have examined how committing criminal acts of violence impacts the lives of perpetrators who were mentally ill at the time of offence and in which the act itself reflects behaviour that is uncharacteristic of the individual. Theoretical accounts and clinical reports [...] Read more.
Few studies have examined how committing criminal acts of violence impacts the lives of perpetrators who were mentally ill at the time of offence and in which the act itself reflects behaviour that is uncharacteristic of the individual. Theoretical accounts and clinical reports describe a phenomenon termed moral injury, which profiles the deleterious emotional effects that can arise from actions that transgress moral beliefs and expectations. Shame, guilt, spiritual/existential conflict, and loss of trust are considered to be core symptoms of moral injury with growing empirical studies which examine moral injury in military and public safety worker samples. The extent to which these kinds of moral injury phenomena might be evident among mentally ill perpetrators was explored using a qualitative-methods approach in a sample of 19 adult participants hospitalized in a Canadian forensic programme inpatient service. The sample consisted of 13 male and 6 female patients, with a mean age of 36.2 years (SD = 10.8), and the majority diagnosed with schizophrenia or schizoaffective disorder. A qualitative interview was conducted where participants were asked to describe feelings about the index offence, the effect it has had on their well-being, and how they have coped with having committed the offence. Using a reflexive thematic analysis process, 5 themes and 23 subthemes were generated that relate to the various resultant impacts. The five themes which emerged were (1) Living with the Emotional Aftermath; (2) Trying to Make Sense and Coming to Terms; (3) My Eyes Have Opened; (4) Facing the Music; and (5) Moving On. The findings are discussed in terms of their implications for understanding forensic inpatients who may be attempting to come to terms with violence they committed while mentally ill and for informing moral injury intervention strategies which might be adapted for forensic mental health services and public health recidivism prevention programmes. Full article
17 pages, 475 KiB  
Article
Violence in the Family of Origin, Reflective Functioning, and the Perpetration of Isolating Behaviors in Intimate Relationships: A Mediation Model
by Tommaso Trombetta, Maria Noemi Paradiso, Fabrizio Santoniccolo and Luca Rollè
Behav. Sci. 2025, 15(3), 288; https://doi.org/10.3390/bs15030288 - 28 Feb 2025
Viewed by 229
Abstract
Background: The intergenerational transmission of violence from the family of origin to couple relationships in adulthood is well-known in the scientific literature. However, the perpetration of isolating behaviors (IBs) is still poorly explored, and additional studies are required to comprehend the mechanisms that [...] Read more.
Background: The intergenerational transmission of violence from the family of origin to couple relationships in adulthood is well-known in the scientific literature. However, the perpetration of isolating behaviors (IBs) is still poorly explored, and additional studies are required to comprehend the mechanisms that intervene in the association between Violence in the family of origin (VFO) and isolating behaviors. Drawing from Fonagy’s mentalization model, which describes reflective functioning as the capacity to conceive mental states as explanations for one’s own and other people’s behavior, the present study aims to examine the mediating role of reflective functioning in the link between VFO and the perpetration of isolating behaviors. Methods: Online self-report questionnaires were completed by 663 Italian participants (66.8% women; Mage = 28.4, SD = 8.5) who were in a couple relationship in the last 12 months. A mediation model was tested to assess the direct and indirect effects of VFO on the perpetration of isolating behaviors through certainty and uncertainty of mentalization. Results: A direct association was found between VFO and the perpetration of isolating behaviors. Furthermore, we found an indirect effect of VFO on the perpetration of the perpetration of isolating behaviors, mediated by the certainty and uncertainty of mentalization. Conclusions: The results demonstrated the mediating role of reflective functioning in the intergenerational transmission of violence and support its implication in the perpetration of isolating behaviors in couple relationships. Although these results are preliminary, they can provide useful data at the theoretical and clinical levels. Full article
(This article belongs to the Special Issue Intimate Partner Violence: A Focus on Emotion Regulation)
Show Figures

Figure 1

Figure 1
<p>Hypothesized model. Note. VFO = Violence in the family of origin; RFQ_C = Reflective Functioning Questionnaire-certainty; RFQ_U = Reflective Functioning Questionnaire-uncertainty; IB = The perpetration of isolating behaviors. Positive and negative signs are indicative of the relationship between the variables. The solid arrow indicates the direct relationship between the study variables. The dashed arrow indicates the indirect relationship between VFO and IB mediated by RFQ_C and RFQ_U.</p>
Full article ">
15 pages, 602 KiB  
Article
Association Between Bullying/Cyberbullying and Subjective Vitality in Children and Adolescents: The Mediating Role of Mental Toughness
by Pablo Ramírez-Espejo, Alba Rusillo-Magdaleno, Alberto Ruiz-Ariza and Manuel J. de la Torre-Cruz
Pediatr. Rep. 2025, 17(2), 27; https://doi.org/10.3390/pediatric17020027 - 25 Feb 2025
Viewed by 206
Abstract
Background: Previous research has examined to what extent the relationship between bullying/cyberbullying (victims and perpetrators) and psychological well-being is mediated by different cognitive–emotional variables. Objectives: The present study aimed to analyze whether mental toughness acted as a mediating variable in the relationship between [...] Read more.
Background: Previous research has examined to what extent the relationship between bullying/cyberbullying (victims and perpetrators) and psychological well-being is mediated by different cognitive–emotional variables. Objectives: The present study aimed to analyze whether mental toughness acted as a mediating variable in the relationship between bullying, suffered and perpetrated, and subjective vitality. Methods: Three hundred and twelve students in their final year of Primary Education and Compulsory Secondary Education, aged between 11 and 17 years, gave their responses to different self-report measures. Results: The results showed that perceived mental toughness significantly mediated the relationship between victimization and perpetration of aggressive acts through the use of electronic devices and levels of subjective vitality. A similar mediating effect was observed for occasions when the adolescent engaged in bullying acts during face-to-face interactions. Conclusions: It is concluded that high levels of mental toughness may act as a protective mechanism, reducing or mitigating the loss of subjective vitality resulting from being victimized in a virtual environment, as well as from perpetrating aggressive acts during face-to-face interactions and through the use of technological media. Full article
(This article belongs to the Special Issue Mental Health and Psychiatric Disorders of Children and Adolescents)
Show Figures

Figure 1

Figure 1
<p>Graphical representations of the four mediational models (with two covariates included) explored. (<b>a</b>) IV bullying (victim); (<b>b</b>) IV (bullying aggressor); (<b>c</b>) IV (cyberbullying victim); (<b>d</b>) IV (cyberbullying aggressor). * <span class="html-italic">p</span> &lt; 0.05; ** <span class="html-italic">p</span> &lt; 0.01.</p>
Full article ">
24 pages, 602 KiB  
Article
From Pornography Consumption to Sexually Violent Practices: Uncovering the Hidden Influence of Sexual Norms
by Carmen M. Leon, Tatiana Quiñonez-Toral and Eva Aizpurua
Behav. Sci. 2025, 15(3), 243; https://doi.org/10.3390/bs15030243 - 20 Feb 2025
Viewed by 557
Abstract
Understanding the dynamics of sexually violent behavior is essential for developing effective interventions and policies that promote safe and respectful sexual relationships. An important area of research in this context is examining the influence of pornography on sexual behavior, which can inform these [...] Read more.
Understanding the dynamics of sexually violent behavior is essential for developing effective interventions and policies that promote safe and respectful sexual relationships. An important area of research in this context is examining the influence of pornography on sexual behavior, which can inform these efforts. This study explores how sexually permissive attitudes and acceptance of the sexual double standard mediate the relationship between pornography consumption and engagement in violent sexual practices among a sample of the general population in Castilla-La Mancha, Spain (N = 1003; 50.7% men). The sexual double standard refers to the societal belief that men and women should be judged differently for the same sexual behaviors, with men often praised or excused for promiscuity, while women face stigma and shame. The findings reveal gender differences in engagement in sexually violent practices during sexual relationships. Men are more likely to perpetrate these behaviors, while women are more likely to experience them. Importantly, both lifetime and last year pornography consumption are associated with an increased involvement in such practices. This relationship is partially mediated by sexually permissive attitudes, with a stronger mediation effect observed in men. Practitioners can leverage these insights to develop comprehensive strategies that mitigate the risks associated with pornography consumption. Full article
(This article belongs to the Special Issue Psychological Research on Sexual and Social Relationships)
Show Figures

Figure 1

Figure 1
<p>A path diagram showing sexual permissiveness as a mediator between pornography consumption and violent sexual practices.</p>
Full article ">
33 pages, 2371 KiB  
Review
Adolescent Aggression: A Narrative Review on the Potential Impact of Violent Video Games
by Alejandro Borrego-Ruiz and Juan J. Borrego
Psychol. Int. 2025, 7(1), 12; https://doi.org/10.3390/psycholint7010012 - 18 Feb 2025
Viewed by 537
Abstract
Background: Exposure to violent content through video games can shape perceptions of aggression as normative or acceptable, potentially desensitizing adolescents to violence and increasing the likelihood that they will engage in aggressive behavior in their real-world interactions. This narrative review examines the relationship [...] Read more.
Background: Exposure to violent content through video games can shape perceptions of aggression as normative or acceptable, potentially desensitizing adolescents to violence and increasing the likelihood that they will engage in aggressive behavior in their real-world interactions. This narrative review examines the relationship between violent video games (VVGs) and youth aggression, addressing (i) VVG exposure through the lens of Social Learning Theory and the General Aggression Model; (ii) the biological determinants of aggressive behavior, including neurophysiological correlates and the potential modulatory role of the gut microbiome; (iii) and current evidence on the influence of VVG exposure on adolescent aggression. Results: VVG exposure may promote moral disengagement and reinforce aggressive behavior through rewarding violent actions, potentially leading to real-life aggression. Exposure to VVGs increases aggression by elevating cortisol levels, activating the sympathetic nervous system, stimulating the brain’s reward system, and disrupting neurotransmitter balance. Alterations in gut microbiome composition could occur as a result of engaging in VVGs, potentially mirroring the physiological responses observed in violent real-world activities. The relationship between VVGs and aggression among adolescents has been widely explored, with studies generally indicating that VVG exposure can lead to desensitization to violence, reduced empathy, and diminished prosocial behavior. VVGs have also been linked to both bullying perpetration and victimization dynamics among adolescents, contributing to mental health issues, which in turn exacerbate problematic gaming behaviors. Conclusions: While there is evidence suggesting that exposure to VVGs is associated with increased adolescent aggression, discrepancies in the literature highlight the need for further research aimed at improving our understanding of this phenomenon. The studies on this topic reveal significant limitations, including a predominance of cross-sectional designs, methodological shortcomings, small sample sizes, and challenges in generalizing results. Factors such as the developmental stages of the participants, the exclusion of females, and unmeasured variables during long follow-up periods further complicate interpretations. Moreover, parental responsibility and the effectiveness of age ratings require closer examination. Full article
Show Figures

Figure 1

Figure 1
<p>Hypothetical model illustrating the influence of VVGs on aggression according to SLT.</p>
Full article ">Figure 2
<p>Hypothetical model illustrating the influence of VVGs on aggression according to GAM.</p>
Full article ">
25 pages, 4357 KiB  
Article
Investigation of Smart Machines with DNAs in SpiderNet
by Mo Adda and Nancy Scheidt
Future Internet 2025, 17(2), 92; https://doi.org/10.3390/fi17020092 - 17 Feb 2025
Viewed by 220
Abstract
The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting evidence from these vast landscapes, which include diverse devices, networks, and cloud environments. Of [...] Read more.
The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting evidence from these vast landscapes, which include diverse devices, networks, and cloud environments. Of particular concern is the process of evidence collection, especially regarding fingerprints and facial recognition within the realm of vehicle forensics. Moreover, ensuring the integrity of forensic evidence is a critical issue, as it is vulnerable to attacks targeting data centres and server farms. Mitigating these challenges, along with addressing evidence mobility, presents additional complexities. This paper introduces a groundbreaking infrastructure known as SpiderNet, which is based on cloud computing principles. We will illustrate how this architecture facilitates the identification of devices, secures the integrity of evidence both at its source and during transit, and enables investigations into individuals involved in criminal activities. Through case studies, we will demonstrate the potential of SpiderNet to assist law enforcement agencies in addressing crimes perpetrated within IoT environments. Full article
(This article belongs to the Special Issue Security and Privacy Issues in the Internet of Cloud)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The infrastructure of the SpiderNet.</p>
Full article ">Figure 2
<p>DNA structure for IoT devices and users.</p>
Full article ">Figure 3
<p>Operation phases of the SpiderNet.</p>
Full article ">Figure 4
<p>Impact of time frame and saved locations.</p>
Full article ">Figure 5
<p>Impact of saving data on the SpiderNet’s capacity.</p>
Full article ">Figure 6
<p>Storage evolution for 5 devices with a random radius between 10 and 100 m.</p>
Full article ">
21 pages, 313 KiB  
Article
Out of the Mouths of Babes: Black Children’s Experiences of Emotion-Focused Racial–Ethnic Socialization, Coping, and Antiracist Resistance
by Emilie Phillips Smith, Simone E. Bibbs, Deborah J. Johnson, Lekie Dwanyen, Kendal Holtrop and LaVelle Gipson-Tansil
Behav. Sci. 2025, 15(2), 222; https://doi.org/10.3390/bs15020222 - 16 Feb 2025
Viewed by 722
Abstract
Black children in the U.S. learn from scaffolded parental teachings to help manage racial discrimination. Middle childhood is an understudied developmental period for this research. This paper builds upon research on culturally informed practices Black caregivers use to rear their young with a [...] Read more.
Black children in the U.S. learn from scaffolded parental teachings to help manage racial discrimination. Middle childhood is an understudied developmental period for this research. This paper builds upon research on culturally informed practices Black caregivers use to rear their young with a healthy identity and socio-emotional skills to navigate racism Guided by a phenomenological qualitative approach, we conducted focus groups with 39 Black children (Meanage = 7.67, 54% girls, 46% boys). Children reported that their parents imparted a sense of positive identity in terms of their cultural heritage, skin, and hair—areas in which they experienced frequent bullying. A uniqueness of our study is that Black children also reported learning emotion-centered coping strategies that focus on their inner strengths and private speech. They adopted a range of adaptive coping mechanisms such as kindness, ignoring perpetrators, centering their positive identity, identity framing, and fighting back. Through children’s voices, we build upon previous research integrating racial–ethnic socialization (RES) with socio-emotional competencies in response to discrimination. We underscore the importance of exploring racial–ethnic identity development and socialization in childhood, a developmental period in which these processes are understudied. Full article
35 pages, 1262 KiB  
Review
The Transfer, Prevalence, Persistence, and Recovery of DNA from Body Areas in Forensic Science: A Review
by Cara Woollacott, Mariya Goray, Roland A. H. van Oorschot and Duncan Taylor
Forensic Sci. 2025, 5(1), 9; https://doi.org/10.3390/forensicsci5010009 - 14 Feb 2025
Viewed by 557
Abstract
Forensic and medical examiners are often required to sample the body of a victim (either living or deceased), or a suspect of a criminal offence, for foreign DNA. This can provide useful information when the alleged activity involves the presence of various bodily [...] Read more.
Forensic and medical examiners are often required to sample the body of a victim (either living or deceased), or a suspect of a criminal offence, for foreign DNA. This can provide useful information when the alleged activity involves the presence of various bodily fluids such as blood, semen, and/or saliva, as well as skin contact made between a perpetrator and a victim. Optimal recovery techniques for the collection of DNA evidence, following crime-relevant skin contact, can be dependent on the surface being sampled. Additional factors to consider include the body areas typically contacted during various activities and the likelihood of non-self-DNA being present in those areas prior to contacts of interest. Therefore, an understanding of DNA transfer, prevalence, persistence, and recovery on a body can aid in the interpretation of DNA results given activity-level questions and increase the value of the findings from this type of evidence. This review aims to summarise research on DNA-TPPR concerning various human body surfaces following different types of activities. This review examines the prevalence of background DNA on different skin surfaces, the reported DNA transfer associated with different forms of contact, and how different cofounding factors can affect the persistence of DNA. Full article
Show Figures

Figure 1

Figure 1
<p>Summary of key references investigating the prevalence of the background, transfer, and persistence of DNA on different body parts and skin surfaces. References included are listed chronologically and are directly relevant to sampling of the specified body area. The relevant section number within the manuscript is indicated at the top of each box. However, additional relevant research is explored in each section [<a href="#B6-forensicsci-05-00009" class="html-bibr">6</a>,<a href="#B16-forensicsci-05-00009" class="html-bibr">16</a>,<a href="#B17-forensicsci-05-00009" class="html-bibr">17</a>,<a href="#B18-forensicsci-05-00009" class="html-bibr">18</a>,<a href="#B22-forensicsci-05-00009" class="html-bibr">22</a>,<a href="#B25-forensicsci-05-00009" class="html-bibr">25</a>,<a href="#B36-forensicsci-05-00009" class="html-bibr">36</a>,<a href="#B40-forensicsci-05-00009" class="html-bibr">40</a>,<a href="#B41-forensicsci-05-00009" class="html-bibr">41</a>,<a href="#B42-forensicsci-05-00009" class="html-bibr">42</a>,<a href="#B44-forensicsci-05-00009" class="html-bibr">44</a>,<a href="#B45-forensicsci-05-00009" class="html-bibr">45</a>,<a href="#B51-forensicsci-05-00009" class="html-bibr">51</a>,<a href="#B52-forensicsci-05-00009" class="html-bibr">52</a>,<a href="#B53-forensicsci-05-00009" class="html-bibr">53</a>,<a href="#B54-forensicsci-05-00009" class="html-bibr">54</a>,<a href="#B55-forensicsci-05-00009" class="html-bibr">55</a>,<a href="#B56-forensicsci-05-00009" class="html-bibr">56</a>,<a href="#B57-forensicsci-05-00009" class="html-bibr">57</a>,<a href="#B58-forensicsci-05-00009" class="html-bibr">58</a>,<a href="#B59-forensicsci-05-00009" class="html-bibr">59</a>,<a href="#B60-forensicsci-05-00009" class="html-bibr">60</a>,<a href="#B61-forensicsci-05-00009" class="html-bibr">61</a>,<a href="#B62-forensicsci-05-00009" class="html-bibr">62</a>,<a href="#B63-forensicsci-05-00009" class="html-bibr">63</a>,<a href="#B64-forensicsci-05-00009" class="html-bibr">64</a>,<a href="#B65-forensicsci-05-00009" class="html-bibr">65</a>,<a href="#B66-forensicsci-05-00009" class="html-bibr">66</a>,<a href="#B67-forensicsci-05-00009" class="html-bibr">67</a>,<a href="#B68-forensicsci-05-00009" class="html-bibr">68</a>,<a href="#B69-forensicsci-05-00009" class="html-bibr">69</a>,<a href="#B70-forensicsci-05-00009" class="html-bibr">70</a>,<a href="#B71-forensicsci-05-00009" class="html-bibr">71</a>,<a href="#B72-forensicsci-05-00009" class="html-bibr">72</a>,<a href="#B73-forensicsci-05-00009" class="html-bibr">73</a>,<a href="#B74-forensicsci-05-00009" class="html-bibr">74</a>,<a href="#B75-forensicsci-05-00009" class="html-bibr">75</a>,<a href="#B76-forensicsci-05-00009" class="html-bibr">76</a>,<a href="#B77-forensicsci-05-00009" class="html-bibr">77</a>,<a href="#B78-forensicsci-05-00009" class="html-bibr">78</a>,<a href="#B79-forensicsci-05-00009" class="html-bibr">79</a>,<a href="#B80-forensicsci-05-00009" class="html-bibr">80</a>,<a href="#B81-forensicsci-05-00009" class="html-bibr">81</a>,<a href="#B82-forensicsci-05-00009" class="html-bibr">82</a>,<a href="#B83-forensicsci-05-00009" class="html-bibr">83</a>,<a href="#B84-forensicsci-05-00009" class="html-bibr">84</a>,<a href="#B85-forensicsci-05-00009" class="html-bibr">85</a>,<a href="#B86-forensicsci-05-00009" class="html-bibr">86</a>,<a href="#B87-forensicsci-05-00009" class="html-bibr">87</a>,<a href="#B88-forensicsci-05-00009" class="html-bibr">88</a>,<a href="#B89-forensicsci-05-00009" class="html-bibr">89</a>,<a href="#B90-forensicsci-05-00009" class="html-bibr">90</a>,<a href="#B91-forensicsci-05-00009" class="html-bibr">91</a>,<a href="#B92-forensicsci-05-00009" class="html-bibr">92</a>,<a href="#B93-forensicsci-05-00009" class="html-bibr">93</a>,<a href="#B94-forensicsci-05-00009" class="html-bibr">94</a>,<a href="#B95-forensicsci-05-00009" class="html-bibr">95</a>,<a href="#B96-forensicsci-05-00009" class="html-bibr">96</a>,<a href="#B97-forensicsci-05-00009" class="html-bibr">97</a>,<a href="#B98-forensicsci-05-00009" class="html-bibr">98</a>,<a href="#B99-forensicsci-05-00009" class="html-bibr">99</a>]. Figure created in <a href="http://biorender.com" target="_blank">biorender.com</a>.</p>
Full article ">
21 pages, 870 KiB  
Article
The Impact of Trauma and Substance Use on Emotion Regulation and Intimate Partner Violence Perpetration: Implications for Perpetrator Programs
by Cristina Expósito-Álvarez, Manuel Roldán-Pardo, Viviana Vargas, Mina Maeda and Marisol Lila
Behav. Sci. 2025, 15(2), 156; https://doi.org/10.3390/bs15020156 - 1 Feb 2025
Viewed by 682
Abstract
(1) Background: Alcohol and/or other drug use problems (ADUPs) and trauma are key risk factors for intimate partner violence (IPV) that should be addressed in perpetrator programs. Participants with ADUPs and trauma histories may display greater difficulties in emotion regulation, which may increase [...] Read more.
(1) Background: Alcohol and/or other drug use problems (ADUPs) and trauma are key risk factors for intimate partner violence (IPV) that should be addressed in perpetrator programs. Participants with ADUPs and trauma histories may display greater difficulties in emotion regulation, which may increase the likelihood of IPV recidivism. The study aimed to examine differences among participants with trauma, ADUPs, ADUPs and trauma, and without such factors in dropout, IPV, and variables related to emotion regulation at pre- and post-intervention; (2) Methods: A sample of 312 men court-mandated to attend a perpetrator program (Contexto Program) was used. Variables related to emotion regulation difficulties included alexithymia, depressive symptomatology, and clinical syndromes. IPV variables included self-reported physical and psychological IPV and IPV recidivism risk assessed by facilitators. Comparisons between groups were made using one-way ANOVA, chi-square tests, and two-way repeated measures ANOVAs; (3) Results: Participants with ADUPs and trauma presented greater difficulties on variables related to emotion regulation, higher risk of IPV at pre-intervention, and higher dropout rates. At post-intervention, all participants improved their emotion regulation skills and reduced IPV recidivism risk, with participants with ADUPs and trauma maintaining a higher risk of IPV; (4) Conclusions: IPV perpetrators with ADUPs and trauma are high-risk participants. Interventions should target trauma and ADUPs to improve their effectiveness. Full article
(This article belongs to the Special Issue Intimate Partner Violence: A Focus on Emotion Regulation)
Show Figures

Figure 1

Figure 1
<p>Comparison of the risk of intimate partner violence over time by group.</p>
Full article ">Figure 2
<p>Comparison of variables related to emotion regulation over time by group.</p>
Full article ">
17 pages, 265 KiB  
Article
Sociopsychological Analysis of a Highly Vulnerable Category of Adolescents: Victim-Perpetrators of Cyberbullying from a Wide National Survey of Italian Adolescents
by Antonio Tintori, Giulia Ciancimino and Loredana Cerbara
Societies 2025, 15(2), 25; https://doi.org/10.3390/soc15020025 - 31 Jan 2025
Viewed by 623
Abstract
The increase in screen time observed in recent years has exposed adolescents to a heightened risk of involvement in cyberbullying, negatively affecting their relational and psychological well-being. This study analyses data from a 2022 representative survey of Italian adolescents employing an interdisciplinary approach. [...] Read more.
The increase in screen time observed in recent years has exposed adolescents to a heightened risk of involvement in cyberbullying, negatively affecting their relational and psychological well-being. This study analyses data from a 2022 representative survey of Italian adolescents employing an interdisciplinary approach. Through bivariate analyses and logistic regression models, it investigates the key sociodemographic characteristics of perpetrators, victims, and victim-perpetrators, alongside the sociological and psychological factors associated with these roles. The findings reveal that cyberbullying victimisation disproportionately affects girls and foreign adolescents, though it spans across various family backgrounds, age groups, and school types. Of particular concern are those who are both perpetrators and victims (14.2%), as they represent the most vulnerable group. These adolescents, who react to online and offline violence with further online aggression, suffer from poor-quality relationships, adherence to racist stereotypes, tolerance for violence, and scarce psychological well-being, in terms of low self-esteem, anxiety, and depression. The study underscores the urgent need for comprehensive prevention and intervention strategies, highlighting the crucial role of teachers and parents in in addressing and mitigating the impact of cyberbullying. Full article
17 pages, 251 KiB  
Article
Violence Perpetrated by Learners and Management Towards Early-Career Educators in South African Township Schools
by Tryphina Matlale Matemane and Thulani Andrew Chauke
Soc. Sci. 2025, 14(2), 65; https://doi.org/10.3390/socsci14020065 - 27 Jan 2025
Viewed by 680
Abstract
The reality in South Africa is that township school environments are not safe for early-career educators. According to South Africa’s Constitution in the Bill of Rights, every learner has the right to a free, reputable education. Although educators are obligated to facilitate this [...] Read more.
The reality in South Africa is that township school environments are not safe for early-career educators. According to South Africa’s Constitution in the Bill of Rights, every learner has the right to a free, reputable education. Although educators are obligated to facilitate this free education, the right to education does not supersede the right to safety because, without protection, more rights will be violated. This study aimed to explore forms of violence perpetrated by school management teams and learners against early-career educators in township schools in Soshanguve, South Africa. A qualitative research method was used to access deeper information on the topic. Clarke’s six steps of thematic analysis were used to analyse the data. Semi-structured interviews were used to gather information. The major findings of this study revealed four forms of violence experienced by early-career educators, which included physical and verbal violence, financial violence and sexual violence. This study recommends that parents should make a habit of checking their children’s schoolwork. This will hold learners accountable for their work. Parents should minimise engaging in conflict in the presence of their children, as this can have adverse emotional and psychological effects on them. They should provide a supportive environment for their children, which can foster a positive parent–child relationship. In addition, the community should play a proactive role in combating substance abuse by ensuring that substances are not accessible to children. Full article
(This article belongs to the Section Crime and Justice)
15 pages, 275 KiB  
Article
Impact of Perpetrator and Victim Gender on Perceptions of Stalking Severity
by Megan Brenik, Ana-Cristina Tuluceanu, Emma Smillie, Luan Carpes Barros Cassal, Caroline Mead and Dara Mojtahedi
Behav. Sci. 2025, 15(2), 120; https://doi.org/10.3390/bs15020120 - 24 Jan 2025
Viewed by 619
Abstract
Many individuals will dismiss the seriousness of ex-partner stalking offences, often as a result of inaccurate and problematic beliefs about the offence (stalking myths). However, to date, stalking myth acceptance measurements have only considered attitudes about stereotypical stalking (male stalking a female). The [...] Read more.
Many individuals will dismiss the seriousness of ex-partner stalking offences, often as a result of inaccurate and problematic beliefs about the offence (stalking myths). However, to date, stalking myth acceptance measurements have only considered attitudes about stereotypical stalking (male stalking a female). The current research considered whether inaccurate and problematic perceptions of stalking were dependent on the gender and sexuality of the perpetrator, victim, and participant. Additionally, it examined whether existing stalking myth acceptance scales measuring stereotypical stalking attitudes would predict perceptions of stalking incidents that involved female stalkers and/or male victims. Participants (N = 336) completed the stalking myth acceptance scale and then responded to a series of questions measuring their perceptions towards a stalking vignette. An independent groups design was used to manipulate the gender of the stalker and victim. The need for police intervention was greatest for incidents involving a male stalker and a female victim. Female victims of male stalking were predicted as being the most fearful, whilst male victims of female stalking were rated as least likely to be fearful. Heterosexual males and participants with minority sexual orientations were also more likely to identify the perpetrator’s actions as stalking. Finally, the SMA scales predicted participants’ attitudes for stereotypical stalking cases but not for the other scenarios. The findings demonstrate that gender plays a significant role in stalking perceptions and highlights the need for more inclusive SMA measurements to consider problematic attitudes towards non-stereotypical stalking. Full article
24 pages, 1992 KiB  
Article
Evaluation of the Drive Intervention for High-Harm Domestic Abuse Perpetrators in England and Wales Using a Quasi-Experimental Approach
by Marianne Hester, Ana G. Ortega-Avila, Nathan Eisenstadt and Sarah-Jane Walker
Soc. Sci. 2025, 14(2), 55; https://doi.org/10.3390/socsci14020055 - 21 Jan 2025
Viewed by 757
Abstract
High-risk and high-harm domestic abuse perpetrators pose the greatest risk of serious harm to (ex-)partners and family members. Robust evidence of perpetrator intervention is lacking for this group. The Drive perpetrator intervention in the United Kingdom focuses specifically on high-harm perpetrators to reduce [...] Read more.
High-risk and high-harm domestic abuse perpetrators pose the greatest risk of serious harm to (ex-)partners and family members. Robust evidence of perpetrator intervention is lacking for this group. The Drive perpetrator intervention in the United Kingdom focuses specifically on high-harm perpetrators to reduce abuse and increase safety of victims, using individual case management via support and disruption, co-ordinated multi-agency response and targeted support to victims. This paper reports on evaluation of the Drive pilot. A high quality quasi-experimental approach with individually randomised intervention and controls was applied in three areas in England and Wales. High-risk perpetrators (N = 2627) were allocated randomly to either Drive or usual care (support to victim). Change in safety and risk for Drive-associated victims was compared with the usual care victim group. Longer-term outcomes were assessed before, during and 12 months following the intervention for Drive and control group perpetrators at one site. The Drive intervention reduced abusive perpetrator behaviours and increased safety for victims compared to the control. The reduction in perpetration by both serial and repeat perpetrators sustained for a year after the end of the intervention and was statistically significant (p < 0.001) for Drive perpetrators compared to the control. Full article
Show Figures

Figure 1

Figure 1
<p>Change in severity for each of the types of DVA for those allocated to Drive (n = 506).</p>
Full article ">Figure 2
<p>Comparing DVA behaviours reported by Drive victims–survivors (n = 89) and Control victims–survivors (n = 274) across intake and exit.</p>
Full article ">Figure 3
<p>IDVA perception of whether change in risk to Drive (n = 89) and control (n = 274) victims–survivors is sustained.</p>
Full article ">Figure 4
<p>Percentage of Drive and control cases recorded by police as committing domestic abuse-related incidents before, during and after Drive completion and by allocation arm (n = 322 perpetrators).</p>
Full article ">Figure 5
<p>Percentage of Drive and control serial perpetrator cases re-appearing at MARAC during and after the Drive intervention.</p>
Full article ">Figure 6
<p>Percentage of Drive and control serial perpetrators recorded by police as committing domestic abuse-related incidents before, during and after Drive completion and by allocation arm (n = 70 perpetrators).</p>
Full article ">Figure 7
<p>Percentage of Drive and control repeat perpetrators recorded by the police as committing domestic abuse-related incidents before, during and following Drive completion by allocation arm (n = 260 perpetrators).</p>
Full article ">Figure A1
<p>Consort flow diagram for perpetrators.</p>
Full article ">Figure A2
<p>Consort flow diagram for primary victims-survivors.</p>
Full article ">
21 pages, 1171 KiB  
Article
Statistical Analysis of the Sum of Double Random Variables for Security Applications in RIS-Assisted NOMA Networks with a Direct Link
by Sang-Quang Nguyen, Phuong T. Tran, Bui Vu Minh, Tran Trung Duy, Anh-Tu Le, Lubos Rejfek and Lam-Thanh Tu
Electronics 2025, 14(2), 392; https://doi.org/10.3390/electronics14020392 - 20 Jan 2025
Viewed by 800
Abstract
Next- generation wireless communications are projected to integrate reconfigurable intelligent surfaces (RISs) to perpetrate enhanced spectral and energy efficiencies. To quantify the performance of RIS-aided wireless networks, the statistics of a single random variable plus the sum of double random variables becomes a [...] Read more.
Next- generation wireless communications are projected to integrate reconfigurable intelligent surfaces (RISs) to perpetrate enhanced spectral and energy efficiencies. To quantify the performance of RIS-aided wireless networks, the statistics of a single random variable plus the sum of double random variables becomes a core approach to reflect how communication links from RISs improve wireless-based systems versus direct ones. With this in mind, the work applies the statistics of a single random variable plus the sum of double random variables in the secure performance of RIS-based non-orthogonal multi-access (NOMA) systems with the presence of untrusted users. We propose a new communication strategy by jointly considering NOMA encoding and RIS’s phase shift design to enhance the communication of legitimate nodes while degrading the channel capacity of untrusted elements but with sufficient power resources for signal recovery. Following that, we analyze and derive the closed-form expressions of the secrecy effective capacity (SEC) and secrecy outage probability (SOP). All analyses are supported by extensive Monte Carlo simulation outcomes, which facilitate an understanding of system communication behavior, such as the transmit signal-to-noise ratio, the number of RIS elements, the power allocation coefficients, the target data rate of the communication channels, and secure data rate. Finally, the results demonstrate that our proposed communication can be improved significantly with an increase in the number of RIS elements, irrespective of the presence of untrusted proximate or distant users. Full article
(This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects)
Show Figures

Figure 1

Figure 1
<p>PDF and CDF validation under different settings of RIS elements. (<b>a</b>,<b>c</b>,<b>e</b>) illustrate the CDF of <math display="inline"><semantics> <mrow> <mrow> <mo stretchy="false">|</mo> </mrow> <msub> <mi>τ</mi> <mi mathvariant="sans-serif">B</mi> </msub> <msup> <mrow> <mo stretchy="false">|</mo> </mrow> <mn>2</mn> </msup> </mrow> </semantics></math> and (<b>b</b>,<b>d</b>,<b>f</b>) show the PDF of <math display="inline"><semantics> <mrow> <mrow> <mo stretchy="false">|</mo> </mrow> <msub> <mi>τ</mi> <mi mathvariant="sans-serif">W</mi> </msub> <msup> <mrow> <mo stretchy="false">|</mo> </mrow> <mn>2</mn> </msup> </mrow> </semantics></math> under different settings of RIS elements and channel distributions.</p>
Full article ">Figure 2
<p>SOP performance against transmit SNR and power allocation. (<b>a</b>) shows the SOP with respect to (w.r.t.) the SNR <math display="inline"><semantics> <mover> <mi>γ</mi> <mo>¯</mo> </mover> </semantics></math> and (<b>b</b>) illustrates the SOP w.r.t. power allocation coefficient <math display="inline"><semantics> <msub> <mi>ρ</mi> <mi mathvariant="sans-serif">W</mi> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>SOP performance against target rate transmission. (<b>a</b>) shows the SOP w.r.t. the Willie’s target data rates and (<b>b</b>) illustrates the SOP regarding the Bob’s secure rate <math display="inline"><semantics> <msub> <mi>R</mi> <mi mathvariant="sans-serif">B</mi> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>SEC performance against transmit SNR and power allocation. (<b>a</b>) shows the SEC with respect to (w.r.t.) the SNR <math display="inline"><semantics> <mover> <mi>γ</mi> <mo>¯</mo> </mover> </semantics></math> and (<b>b</b>) illustrates the SEC w.r.t. power allocation coefficient <math display="inline"><semantics> <msub> <mi>ρ</mi> <mi mathvariant="sans-serif">W</mi> </msub> </semantics></math>.</p>
Full article ">
Back to TopTop