112 research outputs found

    A Drug Dosage Table is a Useful Tool to Facilitate Prescriptions of Antiretroviral Drugs for Children in Thailand.

    Get PDF
    Scaling up of antiretroviral treatment (ART) for children in countries like Thailand will require decentralization and management by non-specialist doctors. We describe (a) the formulation of a standardized drug dosage table to facilitate antiretroviral drug (ARV) prescriptions for children, (b) the acceptability of such a table among doctors and (c) the safety and efficacy of drug doses in the table. Acceptability was assessed using a questionnaire. Safety and efficacy were assessed on the basis of incidence of adverse effects and virological response to treatment, respectively. Of all doctors (n=18), 17 (94%) found that the table was practical to use, avoided miscalculations and made them more confident with prescriptions. Of 49 children prescribed ARVs, less than 5% had adverse side-effects. All ARV-naïve children achieved undetectable viral loads within six months of ART. In our setting, a standardized drug dosage table provided a simple and reliable tool that facilitated ARV prescriptions for children

    What We Think We Know About Cybersecurity: An Investigation of the Relationship between Perceived Knowledge, Internet Trust, and Protection Motivation in a Cybercrime Context

    Get PDF
    Individual internet users are commonly considered the weakest links in the cybersecurity chain. One reason for this is that they tend to be overoptimistic regarding their own online safety. To gain a better understanding of the cognitive processes involved in this assessment, the current study applies an extended version of the protection motivation theory. More specifically, this study includes perceived knowledge and internet trust to discover how these antecedents influence the threat and coping appraisal processes. Based on representative survey data collected from 967 respondents, we found that people who feel well-informed about online safety feel less vulnerable to cybercrime and are less inclined to take security measures. At the same time, feeling informed is associated with being more convinced of the severity of cybercrime. High levels of trust in the safety of the internet are linked to the feeling that one is less vulnerable to cybercrime and the perception that cybercrime is not a severe threat. Future interventions should remind internet users about their own perceived vulnerability and the risks that exist online while ensuring that internet users do not lose their trust in the internet and confidence in their own online knowledge

    Abilities to explicitly and implicitly infer intentions from actions in adults with autism spectrum disorder

    Get PDF
    Previous research suggests that Autism Spectrum Disorder (ASD) might be associated with impairments on implicit but not explicit mentalizing tasks. However, such comparisons are made difficult by the heterogeneity of stimuli and the techniques used to measure mentalizing capabilities. We tested the abilities of 34 individuals (17 with ASD) to derive intentions from others’ actions during both explicit and implicit tasks and tracked their eye-movements. Adults with ASD displayed explicit but not implicit mentalizing deficits. Adults with ASD displayed typical fixation patterns during both implicit and explicit tasks. These results illustrate an explicit mentalizing deficit in adults with ASD, which cannot be attributed to differences in fixation patterns

    Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking

    Get PDF
    Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology. Criminal hacking in older adolescents (16–19-year-olds) was assessed using an adapted Theory of Planned Behaviour (TPB) model, a cohesive theoretical framework that incorporates cognitive processes and human drivers (informed by psychology, cyberpsychology, and criminology theory). In 2021, a large-scale anonymous online survey was conducted across nine European countries. Criminal hacking was assessed using data from 3985 participants (M = 1895, 47.55%; F = 1968, 49.39%). This study formulated a powerful predictive model of youth hacking intention (accounting for 38.8% of the variance) and behaviour (accounting for 33.6% of the variance). A significant minority, approximately one in six (16.34%), were found to have engaged in hacking, and approximately 2% reported engaging in hacking often or very often. Increased age, being male, and offline deviant behaviour were significant predictors of hacking behaviour. In line with the TPB, intention was the strongest individual predictor of hacking behaviour, which in turn was significantly predicted by cognitive processes accounted for by TPB constructs: subjective norms of family and peers, attitudes towards hacking, and perceived behavioural control. These TPB constructs were found to be significantly associated with human factors of risk-taking, toxic online disinhibition, offline deviant behaviour, and demographic variables of age and gender. Implications for future research, interventions, policy, and practice are discussed

    The relationship between dark triad personality traits and sexting behaviors among adolescents and young adults across 11 countries

    Get PDF
    Background: Sexting is an increasingly common phenomenon among adolescents and young adults. Some studies have investigated the role of personality traits in different sexting behaviors within mainstream personality taxonomies like Big Five and HEXACO. However, very few studies have investigated the role of maladaptive personality factors in sexting. Therefore, the present study investigated the relationship between Dark Triad Personality Traits and experimental (i.e., sharing own sexts), risky (i.e., sexting under substance use and with strangers), and aggravated sexting (i.e., non-consensual sexting and sexting under pressure) across 11 countries. Methods: An online survey was completed by 6093 participants (Mage = 20.35; SDage = 3.63) from 11 different countries which covered four continents (Europe, Asia, Africa, and America). Participants completed the Sexting Behaviors Questionnaire and the 12-item Dark Triad Dirty Dozen scale. Results: Hierarchical regression analyses showed that sharing own sexts was positively predicted by Machiavellianism and Narcissism. Both risky and aggravated sexting were positively predicted by Machiavellianism and Psychopathy. Conclusions: The present study provided empirical evidence that different sexting behaviors were predicted by Dark Triad Personality Traits, showing a relevant role of Machiavellian-ism in all kinds of investigated sexting behaviors. Research, clinical, and education implications for prevention programs are discussed

    Measuring Reciprocity in High Functioning Children and Adolescents with Autism Spectrum Disorders

    Get PDF
    Few instruments have been developed that measure impairments in reciprocity, a defining feature of autism. We introduce a new test assessing the quality of reciprocal behaviour: the interactive drawing test (IDT). Children and adolescents (n = 49) with and without high functioning autism spectrum disorders (HFASD) were invited to collaborate with an experimenter in making a joint drawing. Within both groups the performance on collaborative reciprocity improved with age. However, compared to the control group, HFASD participants showed less collaborative and more basic reciprocal behaviour and preferred to draw their own objects. They were less tolerant of the experimenter’s input as well. Performance on the IDT was independent of estimated verbal IQ. Reciprocal behaviour in self-initiated objects corresponded with more parental reported autistic traits, while reciprocal behaviour in other-initiated objects corresponded with less autistic traits. The findings of this study suggest that IDT is a promising instrument to assess reciprocity
    corecore