Courtship Violence Experienced by Abused Wives: Similarities in Patterns of Abuse

1985 ◽  
Vol 34 (3) ◽  
pp. 419 ◽  
Author(s):  
Bruce Roscoe ◽  
Nancy Benaske
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Christoph Wronka

Purpose The aim of this paper is to assess the relevance of cryptocurrencies with regard to the money laundering risk on the market and to present widespread money laundering techniques and recognizable patterns of abuse. In addition, this paper aims to find an answer to the question to what extent the measures of the fifth EU Anti-Money Laundering Directive (AMLD) as well as other appropriate preventive measures are sufficient to reduce the money laundering risk in the area of virtual currencies (VC). Design/methodology/approach Firstly, the analysis requires a consideration of the theoretical foundations of money laundering methods, as well as a presentation of the technical foundations of cryptocurrencies and their ecosystem. Secondly, it is discussed to what extent VC are suitable for money laundering, which characteristics enable them to launder money and which new money laundering techniques result from this. In addition, a comparison of different money laundering risk classification is done in relation to VC from the perspective of different actors in the financial market. Findings Owing to their simple electronic storage and transferability, crypto assets pose a concrete risk of money laundering. Their inclusion in the fifth AMLD was therefore a necessary step by the European legislator. However, the question arises to whether the directive and the further preventive measures presented in this paper sufficiently fulfil the objective of reducing the money laundering risk in relation to VC. One positive aspect is the inclusion of the crypto custody business as a financial service in the German Banking Act. According to the definition in Section 1 (1a) sentence 2 no. 6, the offering of wallets is subject to authorization and the offering party becomes an obligated party within the meaning of the Germany Money Laundering Act. From a supervisory point of view, the new licensing requirement is very much welcomed, as the custody of private cryptographic keys entails considerable risks. However, non-custodian wallet providers who do not store the private keys of their users, are not covered. A closer analysis of the amending directive to the fourth EU AMLD reveals that other relevant players in the crypto market, such as mixer and tumbler services, are also not covered. Originality/value It is quite clear that cryptocurrencies and the blockchain technology will continue to accompany one in the coming years. Further credit institutions arising in the market exposed to the described risks will be seen. The paper will therefore present and evaluate possible risk reduction/options for anti-money laundering for new and existing financial institutions.


2005 ◽  
Vol 20 (9) ◽  
pp. 1078-1095 ◽  
Author(s):  
Andrea R. Perry ◽  
Mary Ellen Fromuth
Keyword(s):  

1989 ◽  
Vol 69 (3_suppl) ◽  
pp. 1283-1297 ◽  
Author(s):  
Beth Raymond ◽  
Irene Gillman Bruschi

A questionnaire designed to measure psychological abuse and kindness was responded to by 90 college women involved in dating relationships. Analysis indicated that, while many relationships were low abuse/high kindness, a substantial number were characterized by high abuse/low kindness, high abuse/high kindness and low abuse/low kindness. An analysis of these different categories of dating relationships as well as explanations as to why young women should be in such negative relationships are included. The study also indicated significant differences between women's reports of feelings and behaviors. Finally, a comparison of past versus present relationships showed proportionately few significant differences in behaviors but many significant differences in feelings. The major finding, that some college women are in dating relationships characterized by psychological abuse, was explored, and comparisons to the literature on wife abuse and courtship violence were also included.


1988 ◽  
Vol 14 (1) ◽  
pp. 29-39 ◽  
Author(s):  
W. Robert Lange ◽  
Charles A. Haertzen ◽  
John E. Hickey ◽  
Frederick R. Snyder ◽  
Elizabeth M. Dax ◽  
...  
Keyword(s):  

2011 ◽  
Vol 26 (17) ◽  
pp. 3526-3541 ◽  
Author(s):  
Juliet Robboy ◽  
Kristen G. Anderson

Many studies have investigated the consequences of child sexual abuse (CSA) but few have examined the intergenerational effects of poly- victimization and maladaptive coping. The purpose of this investigation was to examine patterns of maltreatment and maladaptive coping among second-generation CSA survivors. It is hypothesized that: (a) maternal CSA history would be associated with a higher incidence of poly-victimization and maladaptive coping and (b) experiencing more forms of abuse would mediate the relation between maternal CSA history and maladaptive coping behaviors. The method used was a chart review of 139 sexually abused females aged 12 to 17, examining maternal abuse history, maladaptive coping behaviors, and child maltreatment. The results showed that poly-victimization differed as a function of maternal CSA history but maladaptive coping did not. Experiencing more types of abuse was associated with both self-injurious behaviors and substance use. In conclusion, results support the hypothesis that second generation CSA survivors are more likely to experience poly-victimization. Future research should address how intergenerational patterns of abuse might affect presenting symptomatology and treatment outcome.


2017 ◽  
Vol 15 (2) ◽  
pp. 151
Author(s):  
Anik Nur Khaninah ◽  
M. Widjanarko

The objective of this study is to determine the forms of aggressive behavior that received by victims of courtship violence and the factors that causes violence in long term courtship. The method used in this study is a qualitative research method with a phenomenological approach using data collection techniques by observing and interviewing. The sampling technique used in this study is snowball technique. Data analysis techniques follow this stages: analyzing all the data, categorizing data, preparing the psychological dynamics, connecting with the theoretical basis and drawing conclusions. Based on the results of the study, it shows the forms of aggressive behavior that received by victims of violence in courtship is verbal or symbolic aggression behavior, such as harsh words, words that is not worth to listen, mocking/scolding, threatening, insisting, and limiting intercommunication. In case of violation of property rights, is the property of the subjects used at one’s pleasure by their mate without permission. Physical assault is in the form of forced asking or confiscated subject as well as hitting or knocking head. While the reason for the victims to survive is feeling shy because everyone already knows their courtship relationship.Besides, the victim thinks and hopes theirmatewould be better and their relationshipwould be improved.


Sign in / Sign up

Export Citation Format

Share Document