Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Premack, G. Woodruff (1978)
Chimpanzee problem-solving: a test for comprehension.Science, 202 4367
Sarah Lucas, J. Fleming (2005)
Interventions for improving self‐awareness following acquired brain injuryAustralian Occupational Therapy Journal, 52
M. Schofield, G. Mishra (2003)
Validity of self-report screening scale for elder abuse: Women's Health Australia Study.The Gerontologist, 43 1
J. Rotter (1980)
Interpersonal trust, trustworthiness, and gullibility.
H. Marlowe (1986)
Social intelligence: Evidence for multidimensionality and construct independence.Journal of Educational Psychology, 78
L. Goldberg (1993)
The structure of phenotypic personality traits.The American psychologist, 48 1
A. Acevedo, D. Loewenstein (2007)
Nonpharmacological Cognitive Interventions in Aging and DementiaJournal of Geriatric Psychiatry and Neurology, 20
Clyde Donahoe, Michael Carter, William Bloem, Gaye Hirsch, Nora Laasi, Charles Wallace (1990)
Assessment of interpersonal problem-solving skills.Psychiatry, 53 4
(2007)
Predicting and experiencing decision-related emotions: Does trait emotional intelligence matter
R. Sternberg, G. Forsythe, Jennifer Hedlund, Joseph Horvath, R. Wagner, W. Williams, Scott Snook, E. Grigorenko (2000)
Practical Intelligence in Everyday Life
XinQi Dong, M. Simon (2008)
Is Greater Social Support a Protective Factor against Elder Mistreatment?Gerontology, 54
Valerie Stone, Simon Baron-Cohen, Robert Knight (1998)
Frontal Lobe Contributions to Theory of MindJournal of Cognitive Neuroscience, 10
Terry Fulmer, G. Paveza, Ivo Abraham, Susan Fairchild (2000)
Elder neglect assessment in the emergency department.Journal of emergency nursing: JEN : official publication of the Emergency Department Nurses Association, 26 5
L. Nerenberg (2008)
Elder abuse prevention : emerging trends and promising strategies
N. Choi, Deborah Kulick, James Mayer (1999)
Financial Exploitation of Elders: Analysis of Risk Factors Based on County Adult Protective Services DataJournal of Elder Abuse & Neglect, 10
(1989)
Helping elderly victims
Russell Smith (2000)
Fraud and Financial Abuse of Older PersonsCurrent Issues in Criminal Justice, 11
S. Koole, W. Jager, A. Berg, C. Vlek, W. Hofstee
Personality and Social Psychology Bulletin Koole Et Al. / on the Social Nature of Personality on the Social Nature of Personality: Effects of Extraversion, Agreeableness, and Feedback about Collective Resource Use on Cooperation in a Resource Dilemma
D. Spooner, N. Pachana (2006)
Ecological validity in neuropsychological assessment: a case for greater consideration in research with neurologically intact populations.Archives of clinical neuropsychology : the official journal of the National Academy of Neuropsychologists, 21 4
G. Gallup (1998)
Self-awareness and the evolution of social intelligenceBehavioural Processes, 42
N. Sevdalis, K. Petrides, N. Harvey (2007)
Trait emotional intelligence and decision-related emotionsPersonality and Individual Differences, 42
B. Tversky (2004)
Visuospatial Reasoning
R. Bar-On (2001)
Emotional intelligence and self-actualization.
K. Wilber, S. Reynolds (1997)
Introducing a Framework for Defining Financial Abuse of the ElderlyJournal of Elder Abuse & Neglect, 8
Neglect, R. Bonnie, R. Wallace (2003)
A Theoretical Model of Elder Mistreatment
C. Gregory, J. Serra-Mestres, J. Hodges (1999)
Early diagnosis of the frontal variant of frontotemporal dementia: how sensitive are standard neuroimaging and neuropsychologic tests?Neuropsychiatry, neuropsychology, and behavioral neurology, 12 2
J. Fuster (1993)
Frontal lobesCurrent Opinion in Neurobiology, 3
D. Stuss, M. Alexander, D. Floden, M. Binns, B. Levine, A. Mcintosh, Natasha Rajah, S. Hevenor (2002)
Fractionalization and localization of distinct frontal lobe processes: Evidence from focal lesions in humans
W. Graziano, N. Eisenberg (1997)
Agreeableness: A Dimension of Personality
C. Segrin, M. Givertz (2003)
METHODS OF SOCIAL SKILLS TRAINING AND DEVELOPMENT
T. Fulmer (1984)
Elder abuse assessment tool.Dimensions of critical care nursing : DCCN, 3 4
Donna Pinsker, V. Stone, N. Pachana, S. Greenspan (2006)
Social Vulnerability Scale for older adults: Validation study∗Clinical Psychologist, 10
Terrie Lewis (2001)
Fifty Ways to Exploit Your Grandmother: The Status of Financial Abuse of the Elderly in MinnesotaWilliam Mitchell law review, 28
P. Spaan, Link (2009)
Early assessment of dementia : the contribution of different memory components
M. Quinn, S. Tomita (1986)
Elder Abuse and Neglect: Causes, Diagnosis, and Intervention Strategies
S. Baron-Cohen (1989)
The autistic child's theory of mind: a case of specific developmental delay.Journal of child psychology and psychiatry, and allied disciplines, 30 2
R. Sternberg (1984)
Beyond IQ: A Triarchic Theory of Human Intelligence
R. Young (1981)
The Face in the Mirror.Community and junior college journal, 51
O. John, A. Angleitner, F. Ostendorf (1988)
The lexical approach to personality: A historical review of trait taxonomic researchEuropean Journal of Personality, 2
S. Baudic, G. Barba, M. Thibaudet, A. Smagghe, P. Remy, Latchezar Traykov (2006)
Executive function deficits in early Alzheimer's disease and their relations with episodic memory.Archives of clinical neuropsychology : the official journal of the National Academy of Neuropsychologists, 21 1
G. Gallup, James Anderson, S. Platek (2003)
The Self in Neuroscience and Psychiatry: Self-awareness, social intelligence and schizophrenia
R. Sternberg (1988)
The Triarchic Mind: A New Theory of Human Intelligence
(1996)
Financial exploitation: The best kept secret of elder abuse
J. Perner, H. Wimmer (1985)
“John thinks that Mary thinks that…” attribution of second-order beliefs by 5- to 10-year-old children ☆Journal of Experimental Child Psychology, 39
M. Reis, D. Nahmiash (1998)
Validation of the indicators of abuse (IOA) screen.The Gerontologist, 38 4
Elizabeth Mes (1993)
National Survey on Abuse of the Elderly in CanadaJournal of Elder Abuse & Neglect, 4
L. Jacoby (1999)
DECEIVING THE ELDERLY: EFFECTS OF ACCESSIBILITY BIAS IN CUED-RECALL PERFORMANCECognitive Neuropsychology, 16
A. Bellack, R. Morrison, J. Wixted, K. Mueser (1990)
An Analysis of Social Competence in SchizophreniaBritish Journal of Psychiatry, 156
L. Bäckman, Sari Jones, A. Berger, E. Laukka, B. Small (2005)
Cognitive impairment in preclinical Alzheimer's disease: a meta-analysis.Neuropsychology, 19 4
D. Rabiner, J. O'keeffe, David Brown (2004)
A Conceptual Framework of Financial Exploitation of Older PersonsJournal of Elder Abuse & Neglect, 16
Shibley Rahman, B. Sahakian, John Hodges, Robert Rogers, Trevor Robbins (1999)
Specific cognitive deficits in mild frontal variant frontotemporal dementia.Brain : a journal of neurology, 122 ( Pt 8)
T. Fulmer, T. Wetle (1986)
Elder abuse screening and intervention.The Nurse practitioner, 11 5
Dc Washington (1994)
Diagnostic and Statistical Manual of Mental Disorders, 4th Ed.
XinQi Dong, M. Simon, M. Gorbien, Jeffrey Percak, R. Golden (2007)
Loneliness in Older Chinese Adults: A Risk Factor for Elder MistreatmentJournal of the American Geriatrics Society, 55
Patricia Bartlett (2000)
The face in the mirror.Nursing, 30 11
D. Rabiner, David Brown, J. O'keeffe (2004)
Financial Exploitation of Older Persons: Policy Issues and Recommendations for Addressing ThemJournal of Elder Abuse & Neglect, 16
H. Gardner (1993)
Multiple Intelligences: The Theory In Practice, A Reader
C. Gregory, S. Lough, V. Stone, S. Erzinçlioǧlu, Louise Martin, S. Baron-Cohen, J. Hodges (2002)
Theory of mind in patients with frontal variant frontotemporal dementia and Alzheimer's disease: theoretical and practical implications.Brain : a journal of neurology, 125 Pt 4
R. McCrae, O. John (1992)
An introduction to the five-factor model and its applications.Journal of personality, 60 2
S. Greenspan, Gail Loughlin, R. Black (2001)
Credulity and gullibility in people with developmental disorders: A framework for future researchInternational Review of Research in Mental Retardation, 24
L. Bach, A. David (2006)
Self-awareness after acquired and traumatic brain injuryNeuropsychological Rehabilitation, 16
(2005)
Credulity and gullibility among service providers: An attempt to understand why snake oil sells
F. Ehrlich (1993)
Patterns of elder abuseMedical Journal of Australia, 158
T. Fulmer (1991)
Elder mistreatment: Progress in community detection and interventionFamily & Community Health, 14
R. Jung (2005)
Neuropsychological Assessment, 4th ed.American Journal of Psychiatry, 162
K. Mueser, A. Bellack (1998)
Social skills and social functioning.
L. Goldberg, Sarah Hampson, Willem Hof-Stee, Oliver John, Henry Kaiser, Kevin Lanning, Dean Peabody, Tina Rosolack, A. Tellegen
PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES An Alternative "Description of Personality": The Big-Five Factor Structure
(2000)
Adaptive behavior assessment system manual
R. Chan, D. Shum, T. Toulopoulou, E. Chen (2008)
Assessment of executive functions: review of instruments and identification of critical issues.Archives of clinical neuropsychology : the official journal of the National Academy of Neuropsychologists, 23 2
Clinicians are frequently called upon to determine whether an older adult is at undue risk of exploitation and, in particular, financial exploitation. However, there is currently no widely accepted clinical model for describing or explaining who will fall victim to exploitation in later life, and identification of vulnerable older people has been a somewhat onerous process. In this article, an overarching theoretical framework for conceptualizing such forms of vulnerability and its assessment in older adults is presented. Central to this framework are various personal competence factors (i.e., intelligence, cognitive functioning, social intelligence, social skill, personality traits, physical functioning) that purportedly contribute to, or protect against, exploitation. Recommendations and argument for a more holistic approach to assessing and educating potentially vulnerable older adults are presented, as well as directions for future research.
Journal of Applied Gerontology – SAGE
Published: Dec 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.