2014
DOI: 10.4025/actascihealthsci.v36i2.16224
|View full text |Cite
|
Sign up to set email alerts
|

<b>Suicide awareness of japanese family descendants

Abstract: ABSTRACT. This study aimed to comprehend the meaning of suicide for Japanese descendants. This was a qualitative study, based on Grounded Theory, using a structured interview with sixteen questions, digitally recorded. Subjects were ten descendants who were interviewed in 2011. The opinions of the interviewed showed factors of psychological, social and cultural origin involved in suicide, such as: heredity, religion, mental health, personality characteristics and interpersonal relationships, pleasure and pain … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The main feature of cloud computing is its data storage service which has brought many small enterprises to a leading growth. There are lots of security issues in cloud data storage service which has to be look after and curbed [7].…”
Section: Security Issuesmentioning
confidence: 99%
“…The main feature of cloud computing is its data storage service which has brought many small enterprises to a leading growth. There are lots of security issues in cloud data storage service which has to be look after and curbed [7].…”
Section: Security Issuesmentioning
confidence: 99%
“…Because of the expenses that each physical systems, one of the most important issues that arise, avoiding systems that are used less. Small system applications within the organization can be seen in two ways: [1] desktop machines that rarely use their full potential (ie, systems that operate at night preservation and maintenance purposes, do not do) 2 -or systems and servers that are not currently active. Many organizations are interested in the efficient use of these systems, and in addition to overhead and low cost, highest efficiency in using them.…”
Section: Virtualizationmentioning
confidence: 99%
“…stored. The proposed system has two monitoring systems is at the same time: [1] authenticity observer on key components and data on the network 2. supervisor And can work in two modes: 1. simultaneously V2-for asynchronous notification. honey reqest 2.…”
mentioning
confidence: 99%