Research article Topical Sections

“That was terrifying!”: When 2SLGBTQQ+ individuals and rural women experiencing intimate partner violence are stalked

  • Received: 24 April 2024 Revised: 07 August 2024 Accepted: 26 August 2024 Published: 31 August 2024
  • Background 

    Stalking reflects a lesser-studied form of intimate partner violence (IPV; e.g., physical abuse) that may occur pre- and postseparation between two or more partners, incurring lifelong pervasive health impacts on those involved. Intersectionality theory elucidates how Two-Spirit, lesbian, gay, bisexual, trans, queer, questioning, intersex, and asexual (2SLGBTQQIA+) individuals' and rural women's identities are oppressed by society, thus subjecting them to unique IPV experiences. Therefore, this study aims to explore how stalking manifests among 2SLGBTQQIA+ individuals and women living rurally with lived experiences, both of which are underrepresented groups in current stalking literature.

    Methods 

    We used secondary data from two IPV studies conducted among 2SLGBTQQ+ (no intersex or asexual participants) individuals and rural women (n = 29). We interviewed 2SLGBTQQ+ (n = 18) and rural women (n = 11) who resided in Alberta, Canada and experienced IPV via semi-structured, qualitative approaches. A thematic analysis was guided by intersectionality theory to analyze the data, applying inductive and semantic approaches.

    Findings 

    Of the 29 participants, 15 were stalked by their abusive partners and 9 reported on the negative impacts of being stalked. Rural women and 2SLGBTQQ+ individuals were mainly stalked via physical forms of stalking and cyberstalking, respectively. We describe other forms of stalking and the ineffectiveness of legal systems in those seeking support for stalking. The impacts of stalking (e.g., hypervigilance) were so profound that the feeling of being stalked persisted, which we termed phantom stalking.

    Significance 

    2SLGBTQQ+ individuals predominantly experienced stalking through technology and rural women experienced stalking in more public or physical forms, which stemmed from intersections with community and geographical factors, respectively. We posit the notion of “phantom stalking” and discuss and differentiate it from other psychiatric diagnoses. Additionally, we provide important recommendations related to legislation, education, safety, and research.

    Citation: Stefan Kurbatfinski, Kendra Nixon, Susanne Marshall, Jason Novick, Dawn McBride, Nicole Letourneau. “That was terrifying!”: When 2SLGBTQQ+ individuals and rural women experiencing intimate partner violence are stalked[J]. AIMS Medical Science, 2024, 11(3): 265-291. doi: 10.3934/medsci.2024020

    Related Papers:

    [1] Chunfeng Suo, Yan Wang, Dan Mou . The new construction of knowledge measure on intuitionistic fuzzy sets and interval-valued intuitionistic fuzzy sets. AIMS Mathematics, 2023, 8(11): 27113-27127. doi: 10.3934/math.20231387
    [2] Li Li, Xin Wang . Hamming distance-based knowledge measure and entropy for interval-valued Pythagorean fuzzy sets. AIMS Mathematics, 2025, 10(4): 8707-8720. doi: 10.3934/math.2025399
    [3] Muhammad Riaz, Maryam Saba, Muhammad Abdullah Khokhar, Muhammad Aslam . Novel concepts of m-polar spherical fuzzy sets and new correlation measures with application to pattern recognition and medical diagnosis. AIMS Mathematics, 2021, 6(10): 11346-11379. doi: 10.3934/math.2021659
    [4] Li Li, Mengjing Hao . Interval-valued Pythagorean fuzzy entropy and its application to multi-criterion group decision-making. AIMS Mathematics, 2024, 9(5): 12511-12528. doi: 10.3934/math.2024612
    [5] T. M. Athira, Sunil Jacob John, Harish Garg . A novel entropy measure of Pythagorean fuzzy soft sets. AIMS Mathematics, 2020, 5(2): 1050-1061. doi: 10.3934/math.2020073
    [6] Atiqe Ur Rahman, Muhammad Saeed, Hamiden Abd El-Wahed Khalifa, Walaa Abdullah Afifi . Decision making algorithmic techniques based on aggregation operations and similarity measures of possibility intuitionistic fuzzy hypersoft sets. AIMS Mathematics, 2022, 7(3): 3866-3895. doi: 10.3934/math.2022214
    [7] Hu Wang . A novel bidirectional projection measures of circular intuitionistic fuzzy sets and its application to multiple attribute group decision-making problems. AIMS Mathematics, 2025, 10(5): 10283-10307. doi: 10.3934/math.2025468
    [8] Changlin Xu, Yaqing Wen . New measure of circular intuitionistic fuzzy sets and its application in decision making. AIMS Mathematics, 2023, 8(10): 24053-24074. doi: 10.3934/math.20231226
    [9] Shichao Li, Zeeshan Ali, Peide Liu . Prioritized Hamy mean operators based on Dombi t-norm and t-conorm for the complex interval-valued Atanassov-Intuitionistic fuzzy sets and their applications in strategic decision-making problems. AIMS Mathematics, 2025, 10(3): 6589-6635. doi: 10.3934/math.2025302
    [10] Muhammad Arshad, Muhammad Saeed, Khuram Ali Khan, Nehad Ali Shah, Wajaree Weera, Jae Dong Chung . A robust MADM-approach to recruitment-based pattern recognition by using similarity measures of interval-valued fuzzy hypersoft set. AIMS Mathematics, 2023, 8(5): 12321-12341. doi: 10.3934/math.2023620
  • Background 

    Stalking reflects a lesser-studied form of intimate partner violence (IPV; e.g., physical abuse) that may occur pre- and postseparation between two or more partners, incurring lifelong pervasive health impacts on those involved. Intersectionality theory elucidates how Two-Spirit, lesbian, gay, bisexual, trans, queer, questioning, intersex, and asexual (2SLGBTQQIA+) individuals' and rural women's identities are oppressed by society, thus subjecting them to unique IPV experiences. Therefore, this study aims to explore how stalking manifests among 2SLGBTQQIA+ individuals and women living rurally with lived experiences, both of which are underrepresented groups in current stalking literature.

    Methods 

    We used secondary data from two IPV studies conducted among 2SLGBTQQ+ (no intersex or asexual participants) individuals and rural women (n = 29). We interviewed 2SLGBTQQ+ (n = 18) and rural women (n = 11) who resided in Alberta, Canada and experienced IPV via semi-structured, qualitative approaches. A thematic analysis was guided by intersectionality theory to analyze the data, applying inductive and semantic approaches.

    Findings 

    Of the 29 participants, 15 were stalked by their abusive partners and 9 reported on the negative impacts of being stalked. Rural women and 2SLGBTQQ+ individuals were mainly stalked via physical forms of stalking and cyberstalking, respectively. We describe other forms of stalking and the ineffectiveness of legal systems in those seeking support for stalking. The impacts of stalking (e.g., hypervigilance) were so profound that the feeling of being stalked persisted, which we termed phantom stalking.

    Significance 

    2SLGBTQQ+ individuals predominantly experienced stalking through technology and rural women experienced stalking in more public or physical forms, which stemmed from intersections with community and geographical factors, respectively. We posit the notion of “phantom stalking” and discuss and differentiate it from other psychiatric diagnoses. Additionally, we provide important recommendations related to legislation, education, safety, and research.



    Since Zadeh introduced fuzzy set theory, extensive research and extension related to fuzzy sets have been pursued. Among the various generalized forms that have been proposed, Atanassov [1] introduced the definition of intuitionistic fuzzy sets (IFSs). This was a broader concept of fuzzy sets designed to address uncertain information. It offered a more precise characterization of such information through the triad of degree of membership, degree of nonmembership, and degree of hesitation. As an extension of IFS, Atanassov [2] presented an alternative definition of interval-valued intuitionistic fuzzy sets (IVIFSs), wherein the degree of membership, nonmembership, and hesitation are represented by subintervals within the range of [0,1]. As a result, it can precisely capture the dynamic features. Furthermore, Xu [3] examined certain attributes and average operators of IVIFSs. Currently, IVIFSs have been extensively utilized in diverse areas, including quality evaluation, venture capital, and medical diagnosis [4,5,6,7], owing to their remarkable flexibility in managing uncertainty or ambiguity.

    Information measures pertaining to IFSs and IVIFSs have garnered escalating attention due to their exceptional performance in addressing practical applications. Interested readers can to [8,9,10]. Axiomatic definitions of distance measures on IFSs and IVIFSs were respectively provided in [11,12]. Furthermore, a novel distance measure for IFSs was introduced through the utilization of line integrals [13]. Drawing from the relationship between distance measure and similarity measure, similarity measure has also been paid attention to by a considerable number of researchers, and numerous scholars investigated the similarity measure for IVIFSs on the basis of distance measures [14,15,16,29,30,31,32]. Fuzzy entropy was initially introduced by Zadeh, and in recent years, there has been a growing interest among scholars in exploring this concept. Interested readers are encouraged to consult references [17,18,19] for further details. An entropy on IVIFSs constructed based on a distance measure was proposed by Zhang et al. [20], and the relationship between similarity measure and entropy was investigated in the paper. Che et al. [21] presented a method for constructing an entropy on IVIFSs in terms of the distance function. The cross-entropy approach, originating from the information theory presented by Shannon [22], was later applied to decision-making problems by Ye [23] who developed the fuzzy cross-entropy of IVIFSs using an analogy with the intuitionistic fuzzy cross-entropy. In recent years, there has been a notable surge in the interest surrounding knowledge measures within the frameworks of IFSs and IVIFSs, as clearly demonstrated by the references [24,25,26]. Das et al. [27] employed the knowledge measures under IFSs and IVIFSs to compute the criterion weights in the decision problem, and Guo [28] considered both aspects of knowledge related to IVIFSs, i.e., information content and information clarity to construct a model of knowledge measure and apply it to a decision-making problem under unknown weights. In addition, some scholars have also extended IVIFS [33,34].

    The structure of this paper is as follows: Section 2 delves into several definitions and axioms that will be utilized in the subsequent research outlined in this paper. Section 3 centers on the construction of similarity measures, knowledge measures, and entropy, all grounded in the axiomatic definition of the closest crisp set and the distance measure. Furthermore, it explores the intricate transformation relationships among these three constructs. Subsequently, we present a range of formulas for information measures, each utilizing distinct functions. In Section 4, we demonstrate the efficacy and versatility of our newly introduced methodologies by applying the proposed knowledge measure to tackle a decision-making problem and the similarity measure to address a pattern recognition problem. Lastly, in Section 5, we offer some concluding remarks on the contents of this paper.

    In this section, we will briefly introduce some of fuzzy set theories and concepts which should be used in this paper. The X in the following text is represented as: X=(x1,x2,,xn). Let N denote the set of natural numbers.

    Definition 2.1. ( [2]) An IVIFS ˜A on a finite set X can be defined as the following form:

    ˜A={<x,μ˜A(x),ν˜A(x)>|xX},

    where μ˜A(x)=[μL˜A(x),μU˜A(x)][0,1] and ν˜A(x)=[νL˜A(x),νU˜A(x)][0,1], which satisfies 0μU˜A(x)+νU˜A(x)1, for any xX. For the interval hesitation margin π˜A(x)=[πL˜A(x),πU˜A(x)][0,1], we have πL˜A(x)=1μU˜A(x)νU˜A(x) and πU˜A(x)=1μL˜A(x)νL˜A(x).

    Specifically, if μL˜A(x)=μU˜A(x) and νL˜A(x)=νU˜A(x), then the IVIFS is reduced to an intuitionistic fuzzy set.

    From the interval representation of membership degree and nonmembership degree of IVIFSs, it is not difficult to see that the geometric meaning of IVIFSs at a certain point is a rectangle, as shown in Figure 1. The three vertices of the triangle are denoted as (0,0),(1,0),(0,1), and the two sides of the triangle represent the degree of membership μ˜A(x) and nonmembership ν˜A(x), so that (0,0) expresses the case if π˜A(x)=1. (1,0) and (0,1) mean the two cases of the crisp sets. For the hypotenuse of the triangle, that is, the segment from (1,0) to (0,1), it corresponds to ν˜A(x)=1μ˜A(x). Moreover, there is 0μ˜A(x)+ν˜A(x)1 for an IVIFS, which also means that none of the individual vertices of the rectangle in Figure 1 can extend beyond the hypotenuse of the triangle.

    Figure 1.  Graphicalization of IVIFS.

    For convenience, let IVIFS(X) express the set of IVIFSs on X. Besides, we use P(X) to denote the set of all crisp sets defined on X.

    Definition 2.2. ( [3]) For any ˜A,˜BIVIFS(X), the following relations can be defined:

    (1) ˜A˜B if μL˜A(x)μL˜B(x), μU˜A(x)μU˜B(x) and νL˜A(x)νL˜B(x), νU˜A(x)νU˜B(x) for any xX;

    (2) ˜A=˜B if ˜A˜B and ˜A˜B;

    (3) The complement set ˜Ac={x,ν˜A(x),μ˜A(x)|xX}.

    Definition 2.3. ( [12]) For any ˜A,˜B,˜CIVIFS(X), a mapping D:IVIFS(X)×IVIFS(X)[0,1] is called a distance measure on IVIFSs, and it satisfies the following properties:

    (D1)0D(˜A,˜B)1;

    (D2)D(˜A,˜B)=0 if ˜A=˜B;

    (D3)D(˜A,˜B)=D(˜B,˜A);

    (D4)D(˜A,˜C)D(˜A,˜B)+D(˜B,˜C);

    (D5)If˜A˜B˜C, then D(˜A,˜C)max{D(˜A,˜B),D(˜B,˜C)}.

    Consider ˜A,˜BIVIFS(X), where ˜A={x,[μL˜A(x),μU˜A(x)],[νL˜A(x),νU˜A(x)]|xX}, ˜B={x,[μL˜B(x),μU˜B(x)],[νL˜B(x),νU˜B(x)]|xX}.

    For convenience, we denote:

    |μL˜A(xi)μL˜B(xi)|=αi,|μU˜A(xi)μU˜B(xi)|=βi,|νL˜A(xi)νL˜B(xi)|=γi,|νU˜A(xi)νU˜B(xi)|=δi.

    For arbitrary p, the distance measure between ˜A and ˜B is presented in the following form:

    Dp(˜A,˜B)=(1qnni=1(αpiβpiγpiδpi))1p, (2.1)

    where the parameter q is determined by the two operations "" and "".

    When p assumes different values, various distance measures can be obtained, as demonstrated in Table 1.

    Table 1.  Different distance measures.
    =+
    =+
    Minkovsky q=4 p=1 DH(˜A,˜B)=(14nni=1(αi+βi+γi+δi))
    p=2 DE(˜A,˜B)=(14nni=1(α2i+β2i+γ2i+δ2i))12
    p=3 DM(˜A,˜B)=(14nni=1(α3i+β3i+γ3i+δ3i))13
    =,=+

    =,=
    p=1 q=2 Hamming-Hausdorff DHH(˜A,˜B)=(12nni=1(αiβi+γiδi))
    q=1 Hausdorff Dh(˜A,˜B)=(1nni=1(αiβiγiδi))

     | Show Table
    DownLoad: CSV

    Definition 2.4. ( [28]) Let ˜A,˜BIVIFS(X), and a mapping K:IVIFS(X)[0,1] is called a knowledge measure on IVIFS(X) if K satisfies the following conditions:

    (K1)K(˜A)=1 if ˜AP(X);

    (K2)K(˜A)=0 if π˜A(x)=[1,1] for any xX;

    (K3)K(˜A)K(˜B) if ˜A is less fuzzy than ˜B, i.e., ˜A˜B for μL˜B(x)νL˜B(x) and μU˜B(x)νU˜B(x) or ˜A˜B for μL˜B(x)νL˜B(x) and μU˜B(x)νU˜B(x), for any xX;

    (K4)K(˜A)=K(˜Ac).

    Definition 2.5. ( [18]) Assume that the entropy is a function E:IVIFS(X)[0,1], which satisfies the nether four conditions:

    (E1)E(˜A)=0 if ˜AP(X);

    (E2)E(˜A)=1 if μ˜A(x)=ν˜A(x) for any xX;

    (E3)E(˜A)E(˜B) if ˜A is less fuzzy than ˜B, i.e., μ˜A(x)μ˜B(x) and ν˜A(x)ν˜B(x) for μ˜B(x)ν˜B(x) or μ˜A(x)μ˜B(x) and ν˜A(x)ν˜B(x) for μ˜B(x)ν˜B(x);

    (E4)E(˜A)=E(˜Ac).

    Furthermore, this paper introduces the definition of the closest crisp set within the realm of IVIFSs and derives several equations pertaining to similarity measure, knowledge measure, and entropy, all grounded in the distance measure. Additionally, it delves into the methodology for converting between these measures.

    The extent of resemblance between two comparable entities is frequently characterized or elucidated through the utilization of similarity measure. Within this segment, we primarily introduce a novel formulation of similarity measure pertaining to IVIFSs, which relies on distance measure and the proximate crisp set denoted as C˜A.

    To this end, inspired by the concept of the closest crisp set considering intuitionistic fuzzy sets in [17], the notion of closest crisp set for IVIFSs is introduced.

    Definition 3.1. Let ˜AIVIFS(X), and the closest crisp set to ˜A, which is denoted by C˜A, satisfies the following condition: If μ˜A(x)ν˜A(x), then xC˜A; if μ˜A(x)ν˜A(x), then xC˜A.

    Since any crisp set is an IVIFS with zero interval hesitation index, the closest crisp set of ˜A can be expressed as:

    μLC˜A(x)=μUC˜A(x)={1ifμL˜A(x)νL˜A(x),μU˜A(x)νU˜A(x),0otherwise, (3.1)
    νLC˜A(x)=νUC˜A(x)={0ifμL˜A(x)νL˜A(x),μU˜A(x)νU˜A(x),1otherwise. (3.2)

    From Figure 2, it can be seen that in the left panel, μL˜A(x)>νL˜A(x),μU˜A(x)>νU˜A(x), so that there is xC˜A, or μLC˜A(x)=μUC˜A(x)=1, νLC˜A(x)=νUC˜A(x)=0. The opposite is true for the right panel, μL˜A(x)<νL˜A(x),μU˜A(x)<νU˜A(x); thus, there is xC˜A, or μLC˜A(x)=μUC˜A(x)=0, νLC˜A(x)=νUC˜A(x)=1.

    Figure 2.  Examples of the closest crisp sets to IVIFSs ˜A and ˜B.

    Next, a corollary is given below that presents practical properties of the closest crisp set.

    Corollary 3.2. Assume that ˜AIVIFS(X), and let C˜A be its closest crisp set. It has the following properties:

    (1) ˜AP(X) if, and only if, ˜A=C˜A.

    (2) If μL˜A(x)νL˜A(x),μU˜A(x)νU˜A(x), then Cc˜A(x)=C˜Ac(x) for any xX, where C˜Ac expresses the closest crisp set to Ac.

    The preceding Corollary 3.2(2) can be elucidated more intuitively by scrutinizing Figure 3, which illustrates that the rectangular positions designated by ˜A(x) and ~Ac(x) are precisely as depicted in the image when the conditions μL˜A(x)νL˜A(x) and μU˜A(x)νU˜A(x) are satisfied. Furthermore, it becomes evident that C˜A(x) and C˜Ac(x) occupy opposing corners, thereby establishing the equality Cc˜A(x)=C˜Ac(x). Note here that the conditional requirement of Corollary 3.2(2) is μL˜A(x)νL˜A(x),μU˜A(x)νU˜A(x), the reason for which is that if μL˜A(x)=νL˜A(x),μU˜A(x)=νU˜A(x), as shown in Figure 4, then ˜A(x) and ˜Ac(x) are coincident and their closest crisp sets are the same.

    Figure 3.  Graphical representation of Corollary 3.2(2).
    Figure 4.  Graphical representation of μL˜A(x)=νL˜A(x),μU˜A(x)=νU˜A(x).

    Based on the proposed the closest crisp set, information measure functions are explored.

    Definition 3.3. A function f:[0,1]2[0,1] is called a binary aggregation function, for any x,y[0,1], it satisfies the following conditions:

    (1) f is component-wise increasing;

    (2) f(0,0)=0;

    (3) f(1,1)=1;

    (4) f(x,y)=f(y,x).

    Definition 3.4. ( [9]) Let ˜A,˜BIVIFS(X), and a mapping S: IVIFS(X)×IVIFS(X)[0,1] is called a similarity measure on IVIFSs if S satisfies the following properties:

    (S1) Boundary: 0S(˜A,˜B)1;

    (S2) Symmetry: S(˜A,˜B)=S(˜B,˜A);

    (S3) Reflexivity: S(˜A,˜B)=1 iff ˜A=˜B;

    (S4) Complementarity: S(˜A,˜Ac)=0 iff ˜AP(X).

    Theorem 3.5. Let f:[0,1]×[0,1][0,1] be a binary aggregation function and D be an aforementioned distance in Definition 2.3 for IVIFSs. Then, for any ˜A,˜BIVIFS(X),

    S(˜A,˜B)=f(D(˜A,C˜A),D(˜B,C˜B))

    is a similarity measure for IVIFSs.

    Proof. In the following, we will prove the proposed formula satisfies four conditions in Definition 3.4.

    (S1): It is clearly established.

    (S2): By the definition of function f, it can be clearly deduced that

    S(˜A,˜B)=f(D(˜A,C˜A),D(˜B,C˜B))=f(D(˜B,C˜B),D(˜A,C˜A))=S(˜B,˜A).

    (S3): If S(˜A,˜B)=1, according to the definition of f and the distance measure, we can get

    f(D(˜A,C˜A),D(˜B,C˜B))=1D(˜A,C˜A)=D(˜B,C˜B)=1,

    thus, ˜A=˜B.

    (S4): If S(˜A,˜Ac)=0, based on the definition of f and the distance measure,

    f(D(˜A,C˜A),D(˜Ac,C˜Ac))=0D(˜A,C˜A)=D(˜Ac,C˜Ac)=0

    can be deduced. Then, ˜AP(X).

    With regards to Theorem 3.5, it is feasible to devise diverse formulations for calculating similarity measures on IVIFSs, leveraging various binary aggregation functions f:[0,1]×[0,1][0,1]. By incorporating distinct functions f and distance measures D, a range of similarity measures can be derived, as exemplified in Table 2.

    Table 2.  Different similarity measures.
    Distance measures Conversion functions Similarity measures
    DH(˜A,˜B) f1(x,y)=x+y2 SH1(˜A,˜B)=DH(˜A,C˜A)+DH(˜B,C˜B)2
    f2(x,y)=sin(x+y)π4 SH2(˜A,˜B)=sin(DH(˜A,C˜A)+DH(˜B,C˜B))π4
    f3(x,y)=kx+y2(k>1) SH3(˜A,˜B)=kDH(˜A,C˜A)+DH(˜B,C˜B)2(k>1)
    f4(x,y)=logx+y+13 SH4(˜A,˜B)=log(DH(˜A,C˜A)+DH(˜B,C˜B))3
    f5(x,y)=2xy1 SH5(˜A,˜B)=2DH(˜A,C˜A)DH(˜B,C˜B)1
    DE(˜A,˜B) f1(x,y)=x+y2 SE1(˜A,˜B)=DE(˜A,C˜A)+DE(˜B,C˜B)2
    f2(x,y)=sin(x+y)π4 SE2(˜A,˜B)=sin(DE(˜A,C˜A)+DE(˜B,C˜B))π4
    f3(x,y)=kx+y2(k>1) SE3(˜A,˜B)=kDE(˜A,C˜A)+DE(˜B,C˜B)2(k>1)
    f4(x,y)=logx+y+13 SE4(˜A,˜B)=log(DE(˜A,C˜A)+DE(˜B,C˜B))3
    f5(x,y)=2xy1 SE5(˜A,˜B)=2DE(˜A,C˜A)DE(˜B,C˜B)1
    DM(˜A,˜B) f1(x,y)=x+y2 SM1(˜A,˜B)=DM(˜A,C˜A)+DM(˜B,C˜B)2
    f2(x,y)=sin(x+y)π4 SM2(˜A,˜B)=sin(DM(˜A,C˜A)+DM(˜B,C˜B))π4
    f3(x,y)=kx+y2(k>1) SM3(˜A,˜B)=kDM(˜A,C˜A)+DM(˜B,C˜B)2(k>1)
    f4(x,y)=logx+y+13 SM4(˜A,˜B)=log(DM(˜A,C˜A)+DM(˜B,C˜B))3
    f5(x,y)=2xy1 SM5(˜A,˜B)=2DM(˜A,C˜A)DM(˜B,C˜B)1
    DHH(˜A,˜B) f1(x,y)=x+y2 SHH1(˜A,˜B)=DHH(˜A,C˜A)+DHH(˜B,C˜B)2
    f2(x,y)=sin(x+y)π4 SHH2(˜A,˜B)=sin(DHH(˜A,C˜A)+DHH(˜B,C˜B))π4
    f3(x,y)=kx+y2(k>1) SHH3(˜A,˜B)=kDHH(˜A,C˜A)+DHH(˜B,C˜B)2(k>1)
    f4(x,y)=logx+y+13 SHH4(˜A,˜B)=log(DHH(˜A,C˜A)+DHH(˜B,C˜B))3
    f5(x,y)=2xy1 SHH5(˜A,˜B)=2DHH(˜A,C˜A)DHH(˜B,C˜B)1
    Dh(˜A,˜B) f1(x,y)=x+y2 Sh1(˜A,˜B)=Dh(˜A,C˜A)+Dh(˜B,C˜B)2
    f2(x,y)=sin(x+y)π4 Sh2(˜A,˜B)=sin(Dh(˜A,C˜A)+Dh(˜B,C˜B))π4
    f3(x,y)=kx+y2(k>1) Sh3(˜A,˜B)=kDh(˜A,C˜A)+Dh(˜B,C˜B)2(k>1)
    f4(x,y)=logx+y+13 Sh4(˜A,˜B)=log(Dh(˜A,C˜A)+Dh(˜B,C˜B))3
    f5(x,y)=2xy1 Sh5(˜A,˜B)=2Dh(˜A,C˜A)Dh(˜B,C˜B)1

     | Show Table
    DownLoad: CSV

    The knowledge content of IVIFSs is typically characterized through knowledge measures, with entropy serving as a pivotal quantifying the uncertainty associated with fuzzy variables. In this section, we established an approach of developing similarity measures to devise knowledge measures and entropy for IVIFSs.

    Theorem 3.6. Let f be a function defined in Definition 3.3 and D be an aforementioned distance in Definition 2.3 for IVIFSs. For any ˜AIVIFS(X),

    K(˜A)=1f(D(˜A,C˜A),D(~Ac,C˜Ac))

    is a knowledge measure on IVIFS(X).

    Proof. In the following we will show that the knowledge measure we construct satisfies the four conditions in Definition 2.4.

    (KD1): Let K(˜A)=1, then consider the definition of the function f, that is, D(˜A,C˜A)=D(~Ac,C˜Ac)=0. Therefore, by Definition 2.3 and Corollary 3.2(1), it is easily obtained that ˜AP(X).

    (KD2): It is not difficult to see that if K(˜A)=0, then D(˜A,C˜A)=D(~Ac,C˜Ac)=1, and according to the definition of the distance D,

    μL˜A(x)=μU˜A(x)=νL˜A(x)=νU˜A(x)=0,

    can be obtained. Thus, π˜A(x)=[1,1].

    (KD3): Assume that ˜A˜B for μL˜B(x)νL˜B(x) and μU˜B(x)νU˜B(x). It is certain that

    μL˜A(x)μL˜B(x)νL˜B(x)νL˜A(x),μU˜A(x)μU˜B(x)νU˜B(x)νU˜A(x),

    and from the notion of the closest crisp set, it can be derived that

    μLC˜A(x)=μUC˜A(x)=μLC˜B(x)=μUC˜B(x)=0,
    νLC˜A(x)=νUC˜A(x)=νLC˜B(x)=νUC˜B(x)=1.

    Therefore, let ˜N=<[0,0],[1,1]>, and if ˜N˜A˜B, then

    D(˜A,˜N)=D([μL˜A(x),μU˜A(x)],[νL˜A(x),νU˜A(x)],[0,0],[1,1])D(˜B,˜N)=D([μL˜B(x),μU˜B(x)],[νL˜B(x),νU˜B(x)],[0,0],[1,1]).

    Similarly, it is obvious that D(~Ac,C˜Ac)D(~Bc,C˜Bc). Then, by considering the function f to be component-wise increasing, there is

    f(D(˜A,C˜A),D(~Ac,C˜Ac))f(D(˜B,C˜B),D(~Bc,C˜Bc)).

    Hence, it is easy to know that K(˜A)K(˜B). On the other hand, assume that ˜A˜B for μL˜B(x)νL˜B(x) and μU˜B(x)νU˜B(x). K(˜A)K(˜B) can also be obtained.

    (KD4): In order to verify K(˜A)=K(˜Ac), simply prove that

    f(D(˜A,C˜A),D(~Ac,C˜Ac))=f(D(~Ac,C˜Ac),D(˜A,C˜A)),

    which is obvious from the definition of the function f.

    Next, a series of knowledge measures can be obtained by using different distance measures and different expressions of function f. They are shown in Table 3.

    Table 3.  Different knowledge measures.
    Distance measures Conversion functions Knowledge measures
    DH(˜A,˜B) f1(x,y)=x+y2 KH1(˜A)=1DH(˜A,C˜A)+DH(˜Ac,C˜Ac)2
    f2(x,y)=sin(x+y)π4 KH2(˜A)=1sin(DH(˜A,C˜A)+DH(˜Ac,C˜Ac))π4
    f3(x,y)=kx+y2(k>1) KH3(˜A)=1kDH(˜A,C˜A)+DH(˜Ac,C˜Ac)2(k>1)
    f4(x,y)=logx+y+13 KH4(˜A)=1log(DH(˜A,C˜A)+DH(˜Ac,C˜Ac))3
    f5(x,y)=2xy1 KH5(˜A)=22DH(˜A,C˜A)DH(˜Ac,C˜Ac)
    DE(˜A,˜B) f1(x,y)=x+y2 KE1(˜A)=1DE(˜A,C˜A)+DE(˜Ac,C˜Ac)2
    f2(x,y)=sin(x+y)π4 KE2(˜A)=1sin(DE(˜A,C˜A)+DE(˜Ac,C˜Ac))π4
    f3(x,y)=kx+y2(k>1) KE3(˜A)=1kDE(˜A,C˜A)+DE(˜Ac,C˜Ac)2(k>1)
    f4(x,y)=logx+y+13 KE4(˜A)=1log(DE(˜A,C˜A)+DE(˜Ac,C˜Ac))3
    f5(x,y)=2xy1 KE5(˜A)=22DE(˜A,C˜A)DE(˜Ac,C˜Ac)
    DM(˜A,˜B) f1(x,y)=x+y2 KM1(˜A)=1DM(˜A,C˜A)+DM(˜Ac,C˜Ac)2
    f2(x,y)=sin(x+y)π4 KM2(˜A)=1sin(DM(˜A,C˜A)+DM(˜Ac,C˜Ac))π4
    f3(x,y)=kx+y2(k>1) KM3(˜A)=1kDM(˜A,C˜A)+DM(˜Ac,C˜Ac)2(k>1)
    f4(x,y)=logx+y+13 KM4(˜A)=1log(DM(˜A,C˜A)+DM(˜Ac,C˜Ac))3
    f5(x,y)=2xy1 KM5(˜A)=22DM(˜A,C˜A)DM(˜Ac,C˜Ac)
    DHH(˜A,˜B) f1(x,y)=x+y2 KHH1(˜A)=1DHH(˜A,C˜A)+DHH(˜Ac,C˜Ac)2
    f2(x,y)=sin(x+y)π4 KHH2(˜A,˜B)=sin(DHH(˜A,C˜A)+DHH(˜B,C˜B))π4
    f3(x,y)=kx+y2(k>1) KHH3(˜A,˜B)=kDHH(˜A,C˜A)+DHH(˜B,C˜B)2(k>1)
    f4(x,y)=logx+y+13 KHH4(˜A)=1log(DHH(˜A,C˜A)+DHH(˜Ac,C˜Ac))3
    f5(x,y)=2xy1 KHH5(˜A)=22DHH(˜A,C˜A)DHH(˜Ac,C˜Ac)
    Dh(˜A,˜B) f1(x,y)=x+y2 Kh1(˜A)=1Dh(˜A,C˜A)+Dh(˜Ac,C˜Ac)2
    f2(x,y)=sin(x+y)π4 Kh2(˜A)=1sin(Dh(˜A,C˜A)+Dh(˜Ac,C˜Ac))π4
    f3(x,y)=kx+y2(k>1) Kh3(˜A)=1kDh(˜A,C˜A)+Dh(˜Ac,C˜Ac)2(k>1)
    f4(x,y)=logx+y+13 Kh4(˜A)=1log(Dh(˜A,C˜A)+Dh(˜Ac,C˜Ac))3
    f5(x,y)=2xy1 Kh5(˜A)=22Dh(˜A,C˜A)Dh(˜Ac,C˜Ac)

     | Show Table
    DownLoad: CSV

    Subsequently, entropy from the perspective of knowledge measures for IVIFSs will be explored.

    Corollary 3.7. Let K be a knowledge measure induced by the aforementioned function f for IVIFSs, then for any ˜AIVIFS(X),

    E(˜A)=1K(˜A)

    is an entropy for IVIFSs.

    Based on Corollary 3.7, it is straightforward to deduce the existence of a distinct numerical correlation between entropy and the newly devised knowledge metric. Put simply, within the context of an IVIFS, a system with a lower entropy value may consistently possess a greater quantity of knowledge, provided that it adheres to the prescribed axioms.

    By carefully examining the intricate relationship between the recently introduced knowledge measure and entropy, we can effortlessly deduce certain entropies.

    Upon scrutinizing the information measures previously discussed for IVIFSs, it becomes evident that they share certain linkages, which we shall subsequently elaborate in the form of corollaries.

    Corollary 3.8. Let S be an aforementioned similarity measure in Theorem 3.5 for IVIFSs, and for any ˜AIVIFS(X),

    K(˜A)=1S(˜A,~Ac)

    is a knowledge measure for IVIFSs.

    Corollary 3.9. Let S be an aforementioned similarity measure in Theorem 3.5 for IVIFSs; assuming that ˜AIVIFS(X),

    E(˜A)=S(˜A,~Ac)

    is an entropy for IVIFSs.

    Regarding the construction method and transformation relationship of information measures, there are some important issues to be further discussed below, and these discussions pave the way for the subsequent research.

    (1) Drawing upon the axiomatic definition of IVIFSs, the intricate relationship among similarity measures, knowledge measures, and the entropy of IVIFSs is comprehensively formulated in general terms, accompanied by explicit expressions. Notably, several key findings are presented in the form of theorems, which underscore the existence of a profound connection between the information measures associated with IVIFSs.

    (2) Among these theorems, through the axiomatic definition of IVIFS, we can easily convert the above information measures, i.e., similarity measure, knowledge measure, and entropy, to each other. Specifically, we consider that the similarity measure and knowledge measure of IVIFS can be converted to each other, and, finally, based on the general relationship between knowledge measure and entropy, the entropy is constructed with the similarity measure, so that the larger the similarity measure, the less the amount of knowledge it contains, and the larger the entropy.

    (3) The result of Corollary 3.7 in this paper shows that there is a dyadic relationship between entropy and knowledge measure, which paves the way for continuing to explore whether there is a dyadic relationship between entropy and knowledge measure for fuzzy sets and their extended forms.

    This section employs the recently proposed knowledge measure to tackle multi-attribute decision-making (MADM) problems under conditions of unknown weights, while utilizing the novel similarity measure to address pattern recognition issues within the framework of IVIFSs. The derived outcomes are subsequently contrasted with several established measures for comprehensive analysis.

    In the complex process of MADM, where the weights of individual attributes remain elusive, this subsection introduces a methodology for determining these weights through the utilization of knowledge measures techniques.

    Construct an MADM process that examines m alternatives ˜A={˜A1,˜A2,,˜Am} using n attributes C={C1,C2,,Cn}. Suppose that w=(w1,w2,,wn)T is the weight vector of attributes, where 0wj1 and nj=1wj=1,j=1,2,,n.

    The MADM problem of IVIFSs can be described in the matrix form below:

    R=˜A1˜A2˜AmC1  C2  Cn(˜a11˜a12˜a1n˜a21˜a22˜a2n˜am1˜am2˜amn), (4.1)

    where ˜aij=(x,[μij˜aL(x),μij˜aU(x)],[νij˜aL(x),νij˜aU(x)])|xX(i=1,2,,m;j=1,2,,n) indicates the assessment of an expert corresponding to attribute Cj(j=1,2,,n) to evaluate the alternative ˜Ai(i=1,2,,m).

    Step 1. By defining the knowledge measure of IVIFSs using KH1, the knowledge measure based decision matrix Q=(˜kij)m×n is generated from the decision matrix R above. The matrix Q=(˜kij)m×n is shown below.

    Q=˜A1˜A2˜AmC1  C2  Cn(˜k11˜k12˜k1n˜k21˜k22˜k2n˜km1˜km2˜kmn), (4.2)

    where ˜kij is the knowledge measure corresponding to each ˜aij.

    Step 2. The following formula can be used to construct the attribute weights based on the knowledge measure when the attribute weights wj are completely unknown:

    wj=mi=1˜kijnj=1mi=1˜kij, (4.3)

    where 0wj1 and nj=1wj=1.

    Step 3. In an interval-valued intuitionistic fuzzy environment, the interval-valued intuitionistic fuzzy arithmetic mean operator [3] is used to calculate the weighted aggregation value of each alternative ˜Ai after the weights of each attribute have been determined and the operator is expressed as follows:

    Zi=[μLi,μUi],[νLi,νUi]=[1nj=1(1μij˜aL(x))wj,1nj=1(1μij˜aU(x))wj],[nj=1(νij˜aL(x))wj,nj=1(νij˜aU(x))wj], (4.4)

    where i=1,2,,m;j=1,2,,n. The calculated Zi is an IVIFS.

    Step 4. In order to differentiate between the alternatives, the alternatives will be ranked below by calculating a score function for each alternative, with the following equation:

    ϕ(Zi)=λ(μLi+μUi)(1λ)(νLi+νUi),i=1,2,...,m,λ(0,1). (4.5)

    Subsequently, arrange the alternatives in a nonincreasing sequence of score function, the larger the score function of the alternative, the better the alternative is. In order to realize the whole decision-making process, Figure 5 describes a framework.

    Figure 5.  A methodological framework for solving MADM problems with unknown weights based on knowledge measures.

    In this section, a practical case study, adapted from [5], will be presented to demonstrate the application of the newly introduced knowledge measure in addressing MADM problems involving unknown weights.

    An investment company is about to make an investment, and the four possible choices for the investment capital are (1) ˜A1, a car company; (2) ˜A2, a food company; (3) ˜A3, a computer company; and (4) ˜A4, a branch office. The investment firm is trying to decide which of these is the best option. The following four attributes must also be taken into consideration by the investment company when making its choice: C1: Risk analysis; C2: Growth analysis; C3: Environmental impact analysis; and C4: Social and political impact analysis.

    Let w=(w1,w2,w3,w4)T be the weight vector of the attributes, which is completely unknown. Additionally, the ratings of the alternatives over the attributes are listed in the following Table 4.

    Table 4.  Rating of alternatives in terms of attributes.
    C1 C2 C3 C4
    ˜A1 [0.1,0.2],[0.1,0.2] [0.25,0.5],[0.25,0.5] [0.4,0.5],[0.3,0.5] [0.5,0.5],[0.5,0.5]
    ˜A2 [0.5,0.6],[0.2,0.3] [0.2,0.5],[0.2,0.5] [0.0,0.0],[0.25,0.75] [0.3,0.4],[0.4,0.6]
    ˜A3 [0.25,0.5],[0.25,0.5] [0.2,0.4],[0.2,0.4] [0.2,0.3],[0.4,0.7] [0.2,0.3],[0.5,0.6]
    ˜A4 [0.2,0.3],[0.6,0.7] [0.4,0.7],[0.2,0.3] [0.2,0.5],[0.2,0.5] [0.5,0.7],[0.1,0.3]

     | Show Table
    DownLoad: CSV

    Step 1. Based on KH1, the knowledge measure matrix is calculated as follows:

    Q=˜A1˜A2˜A3˜A4C1   C2   C3   C4(0.50.50.4750.50.650.50.750.5750.50.50.650.650.70.650.50.7). (4.6)

    Step 2. Next, the weight of attributes are calculated by applying Eq (4.3):

    w1=0.2527,w2=0.2312,w3=0.2554,w4=0.2608.

    Step 3. The interval-valued intuitionistic fuzzy weighted average operator can be computed by utilizing the formula presented in Eq (4.4). As a result, the combined results of the schemes are obtained as follows:

    Z1=[0.3326,0.4370],[0.2486,0.3966];Z2=[0.2737,0.4085],[0.2536,0.5111];
    Z3=[0.2129,0.3796],[0.3207,0.5426];Z4=[0.3379,0.5766],[0.2203,0.4234].

    Step 4. The scoring values of the alternatives are calculated with Eq (4.5) when λ=12 as follows:

    ϕ(Z1)=1.1922,ϕ(Z2)=0.8921,ϕ(Z3)=0.6863,ϕ(Z4)=1.4207.

    Therefore, the sorting order is ˜A4˜A1˜A2˜A3, and the optimal alternative is ˜A4. Furthermore, to underscore the practicality of the newly introduced knowledge measure in addressing the MADM problem, we contrast the derived outcomes with diverse entropy and knowledge measures. Evidently, the majority of the ranking outcomes closely align with our findings, as evident from the subsequent Table 5 and Figure 6. Notably, ˜A4 emerges as the optimal solution.

    Table 5.  Comparison results of methods.
    Methods Weighting vector Alternatives ranking
    EJPCZ(E1) [29] w=(0.2274,0.2860,0.2370,0.2496)T ˜A4˜A1˜A2˜A3
    ELZX(E2) [30] w=(0.2274,0.2860,0.2370,0.2496)T ˜A4˜A1˜A2˜A3
    EWWZ(E3) [31] w=(0.2274,0.2860,0.2370,0.2496)T ˜A4˜A1˜A2˜A3
    EZJJL(E4) [32] w=(0.2366,0.3159,0.1859,0.2616)T ˜A4˜A1˜A2˜A3
    Das et al. [27] w=(0.2506,0.2211,0.2472,0.2811)T ˜A4˜A1˜A2˜A3
    Proposed method w=(0.2527,0.2312,0.2554,0.2608)T ˜A4˜A1˜A2˜A3

     | Show Table
    DownLoad: CSV
    Figure 6.  Comparison results of methods.

    The aforementioned examples demonstrate the remarkable effectiveness of applying knowledge measures to tackle MADM problems that involve unknown weights. Additionally, they underscore the usefulness and practical applicability of the newly introduced knowledge measures in our daily lives.

    It is evident that the parameter λ in Eq (4.5) can be interpreted as the weight of membership degree, and its magnitude significantly impacts the ultimate ranking of alternatives. Sensitivity analysis is performed by selecting various λ values. Table 6 presents the score function values ϕ(Zi) and the rankings of each alternative, which are calculated based on different λ values.

    Table 6.  The score function value ϕ(Zi) and alternatives order.
    ϕ(Z1) ϕ(Z2) ϕ(Z3) ϕ(Z4) Alternatives order
    λ=0.1 0.1325 0.0991 0.0763 0.1579 ˜A4˜A1˜A2˜A3
    λ=0.2 0.2980 0.2230 0.1716 0.3552 ˜A4˜A1˜A2˜A3
    λ=0.3 0.5109 0.3823 0.2941 0.6089 ˜A4˜A1˜A2˜A3
    λ=0.4 0.7948 0.5947 0.4576 0.9472 ˜A4˜A1˜A2˜A3
    λ=0.5 1.1922 0.8920 0.6863 1.4207 ˜A4˜A1˜A2˜A3
    λ=0.6 1.7882 1.3380 1.0295 2.1311 ˜A4˜A1˜A2˜A3
    λ=0.7 2.7817 2.0813 1.6015 3.3150 ˜A4˜A1˜A2˜A3
    λ=0.8 4.7686 3.5680 2.7454 5.6829 ˜A4˜A1˜A2˜A3
    λ=0.9 10.7295 8.0280 6.1771 12.7865 ˜A4˜A1˜A2˜A3

     | Show Table
    DownLoad: CSV

    We randomly select 9 values for λ within the interval (0,1), and it is evident that regardless of how λ varies, the ranking of alternatives remains consistent throughout Table 6. Additionally, we will visualize the data in Figure 7, which illustrates that the ultimate ranking remains unaltered despite changes in λ. As evident from Table 6, when λ>0.5, the score function values of the alternative solutions exhibit a substantial increase, primarily due to a greater preference for membership degree under such conditions.

    Figure 7.  The change of the score function of the alternatives under different λ values.

    To clearly demonstrate the disparities among alternative solutions as λ escalates, consider the following definitions: T1=ϕ(Z4)ϕ(Z1),T2=ϕ(Z1)ϕ(Z2),T3=ϕ(Z2)ϕ(Z3). It can be found that with the increase of λ, the discrimination between the alternatives increases in Table 7 and Figure 8. That is to say, with the increase of λ, the score function ϕ(Zi) can better distinguish the alternatives. Therefore, the ranking results should be minimally influenced by subjective factors, which further demonstrates the stability of the method proposed in this paper.

    Table 7.  Discrimination between alternatives.
    T1 T2 T3
    λ=0.1 0.0254 0.0334 0.0229
    λ=0.2 0.0571 0.0750 0.0514
    λ=0.3 0.0980 0.1286 0.0881
    λ=0.4 0.1524 0.2001 0.1371
    λ=0.5 0.2286 0.3002 0.2057
    λ=0.6 0.3428 0.4502 0.3085
    λ=0.7 0.5333 0.7004 0.4799
    λ=0.8 0.9143 1.2007 0.8226
    λ=0.9 2.0571 2.7015 1.8509

     | Show Table
    DownLoad: CSV
    Figure 8.  Discrimination between alternatives under different λ values.

    Novel coronavirus pneumonia (COVID-19) is an acute respiratory infectious disease caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Since its outbreak in Pakistan, the COVID-19 situation there has garnered widespread attention. The epidemic's spread in Pakistan has exhibited certain fluctuations, with a gradual rise in confirmed cases, exerting a profound impact on public health, socioeconomic conditions, and the daily lives of citizens.

    This paper refers to the example of healthcare facilities in Khyber Pakhtunkhwa, Pakistan in [33]. There is currently a review panel comprising three experts, e1,e2, and e3, tasked with evaluating four hospitals Al(l=1,2,3,4) in Khyber Pakhtunkhwa based on four attributes: c1: Reverse Transcription-Polymerase Chain Reaction Facilities (RT-PCR), c2: Personal protective equipment (PPE), c3: Shortage of Isolation Ward (SIW), c4: Hight Qualified Staff (HQS).

    Next, the specific steps of the decision-making method are as follows.

    Step 1. We construct interval valued intuitionistic fuzzy decision matrices, as shown in Tables 810.

    Table 8.  Interval-valued intuitionistic fuzzy decision matrix of e1.
    c1 c2 c3 c4
    A1 [0.3,0.4],[0.1,0.3] [0.2,0.5],[0.2,0.3] [0.4,0.5],[0.3,0.5] [0.1,0.3],[0.3,0.5]
    A2 [0.1,0.3],[0.3,0.4] [0.3,0.4],[0.1,0.4] [0.2,0.4],[0.1,0.2] [0.3,0.4],[0.1,0.2]
    A3 [0.3,0.4],[0.1,0.2] [0.2,0.4],[0.1,0.2] [0.3,0.4],[0.1,0.4] [0.1,0.3],[0.3,0.4]
    A4 [0.1,0.3],[0.3,0.5] [0.4,0.5],[0.3,0.5] [0.2,0.5],[0.2,0.3] [0.3,0.4],[0.1,0.3]

     | Show Table
    DownLoad: CSV
    Table 9.  Interval-valued intuitionistic fuzzy decision matrix of e2.
    c1 c2 c3 c4
    A1 [0.1,0.3],[0.3,0.5] [0.4,0.5],[0.3,0.5] [0.2,0.5],[0.2,0.3] [0.2,0.5],[0.2,0.3]
    A2 [0.3,0.4],[0.1,0.2] [0.2,0.4],[0.1,0.2] [0.3,0.4],[0.1,0.4] [0.3,0.4],[0.1,0.4]
    A3 [0.1,0.3],[0.3,0.4] [0.3,0.4],[0.1,0.4] [0.2,0.4],[0.1,0.2] [0.2,0.4],[0.1,0.2]
    A4 [0.3,0.4],[0.1,0.3] [0.2,0.5],[0.2,0.3] [0.4,0.5],[0.3,0.5] [0.4,0.5],[0.3,0.5]

     | Show Table
    DownLoad: CSV
    Table 10.  Interval-valued intuitionistic fuzzy decision matrix of e3.
    c1 c2 c3 c4
    A1 [0.2,0.5],[0.2,0.3] [0.3,0.5],[0.2,0.3] [0.1,0.3],[0.3,0.5] [0.4,0.5],[0.3,0.5]
    A2 [0.3,0.4],[0.1,0.4] [0.1,0.4],[0.2,0.4] [0.3,0.4],[0.1,0.2] [0.2,0.4],[0.1,0.2]
    A3 [0.2,0.4],[0.1,0.2] [0.3,0.4],[0.1,0.2] [0.1,0.3],[0.3,0.4] [0.3,0.4],[0.1,0.4]
    A4 [0.4,0.5],[0.3,0.5] [0.1,0.5],[0.2,0.5] [0.3,0.4],[0.1,0.3] [0.2,0.5],[0.2,0.3]

     | Show Table
    DownLoad: CSV

    Step 2. By utilizing Kh1 to define the knowledge measure of IVIFSs, a decision matrix Qk(k=1,2,3), grounded in this knowledge measure, is derived from the decision matrix. The matrix Qk(k=1,2,3) is presented as follows.

    Q1=A1A2A3A4c1  c2  c3  c4(0.60.80.60.70.70.70.80.70.70.80.70.70.70.60.80.7).
    Q2=A1A2A3A4c1  c2  c3  c4(0.70.60.80.80.70.80.70.70.70.70.80.80.70.80.60.6).
    Q3=A1A2A3A4c1  c2  c3  c4(0.80.70.70.60.70.80.70.80.80.70.70.70.60.90.70.8).

    Step 3. We assign equal weights to the three experts and aggregate their knowledge measure decision matrices into one using the formula below:

    ˉQ=Q1+Q2+Q33. (4.7)

    Obtain the following knowledge measure aggregation matrix ˉQ:

    ˉQ=A1A2A3A4c1   c2   c3   c4(0.70.70.70.70.70.770.730.730.730.730.730.730.670.770.70.7).

    Step 4. Determine attribute weights by applying Eq (4.3).

    w1=0.2437,w2=0.2585,w3=0.2489,w4=0.2489.

    Step 5. Employ Eq (4.4) to apply weights and aggregate the attributes of the alternative (Table 11).

    Table 11.  Weighted aggregation of alternative attributes.
    e1 e2 e3
    z1 [0.2577,0.4316],[0.2067,0.3869] [0.2357,0.4573],[0.2352,0.3877] [0.2591,0.4563],[0.2447,0.3869]
    z2 [0.2306,0.3770],[0.1307,0.2833] [0.2754,0.4000],[0.1000,0.2824] [0.2278,0.4000],[0.1196,0.2833]
    z3 [0.2286,0.3765],[0.1314,0.2824] [0.2046,0.3770],[0.1307,0.2833] [0.2302,0.3765],[0.1314,0.2824]
    z4 [0.2607,0.4321],[0.2063,0.3877] [0.3289,0.4773],[0.2067,0.3869] [0.2562,0.4768],[0.1858,0.3877]

     | Show Table
    DownLoad: CSV

    Step 6. When λ=12, the score values by each expert to the alternative are calculated using Eq (4.5) as shown in Table 12.

    Table 12.  The score values by each expert.
    φ1 φ2 φ3 φ4
    e1 1.1613 1.4679 1.4623 1.1662
    e2 1.0949 1.7662 1.4051 1.3583
    e3 1.1328 1.5581 1.4660 1.2781

     | Show Table
    DownLoad: CSV

    Step 7. Aggregate the score values of three experts to obtain the final ranking of alternative solutions.

    ˉφ1=1.1297,ˉφ2=1.5974,ˉφ3=1.4445,ˉφ4=1.2675.

    It is not hard to observe that ˉφ2>ˉφ3>ˉφ4>ˉφ1. Thus, yielding the alternative ranking result: A2A3A4A1. This is consistent with the result in [33], which also demonstrates the effectiveness and practicality of the method proposed in this paper.

    Suppose X is a finite universe of discourse. There are m patterns which are denoted by IVIFSs

    ˜Mj={x1,[μL˜Mj(x1),μU˜Mj(x1)],[νL˜Mj(x1),νU˜Mj(x1)],...,xn,[μL˜Mj(xn),μU˜Mj(xn)],[νL˜Mj(xn),νU˜Mj(xn)]|xX}(j=1,2,...,m)

    and a test sample that needs to be categorized exists, which is denoted by IVIFS

    ˜B={x1,[μL˜B(x1),μU˜B(x1)],[νL˜B(x1),νU˜B(x1)],...,xn,[μL˜B(xn),μU˜B(xn)],[νL˜B(xn),νU˜B(xn)]|xX}.

    The following is the recognition process:

    (a) Compute the similarity measure S(˜Mj,˜B) between ˜Mj(j=1,...,m) and ˜B with SH1 and Sh1.

    (b) Sort S(˜Mj,˜B) in ascending order, where a larger value of S(˜Mj,˜B) indicates a closer proximity of ˜B to category ˜Mj.

    A diverse array of scholars have proposed numerous approaches to tackle medical diagnosis from varying perspectives. In this section, we employ pattern recognition techniques to address the medical diagnosis challenge: the collection of symptoms serves as the discourse universe, the patient functions as an unidentified test specimen, and the various diseases correspond to multiple modalities. The objective is to categorize patients into distinct groups based on their respective diseases.

    Suppose X={x1(Temperature),x2(Cough),x3(Headache),x4(Stomach pain)} is a group of symptoms and ˜M={˜M1(Viral fever),˜M2(Typhoid),˜M3(Pneumonia),˜M4(Stomach problem)} is a group of the diseases. Then, the disease-symptom matrix expressed by IVIFSs is shown in Table 13 and data is derived from [16].

    Table 13.  The disease-symptom matrix.
    x1(Temperature) x2(Cough) x3(Headache) x4(Stomach pain)
    ˜M1 [0.8,0.9],[0.0,0.1] [0.7,0.8],[0.1,0.2] [0.5,0.6],[0.2,0.3] [0.6,0.8],[0.1,0.2]
    ˜M2 [0.5,0.6],[0.1,0.3] [0.8,0.9],[0.0,0.1] [0.6,0.8],[0.1,0.2] [0.4,0.6],[0.1,0.2]
    ˜M3 [0.7,0.8],[0.1,0.2] [0.7,0.9],[0.0,0.1] [0.4,0.6],[0.2,0.4] [0.3,0.5],[0.2,0.4]
    ˜M4 [0.8,0.9],[0.0,0.1] [0.7,0.8],[0.1,0.2] [0.7,0.9],[0.0,0.1] [0.8,0.9],[0.0,0.1]

     | Show Table
    DownLoad: CSV

    Let the patient B be expressed as:

    B={x1,[0.4,0.5],[0.1,0.2],x2,[0.7,0.8],[0.1,0.2],x3,[0.9,0.9],[0.0,0.1],x4,[0.3,0.5],[0.2,0.4]}.

    The aim is to categorize patient B into one of diseases ˜M1,˜M2,˜M3,˜M4. We can then obtain the following results on IVIFSs, as shown in Table 14.

    Table 14.  Comparison of results with different similarity measures.
    S(˜M1,B) S(˜M2,B) S(˜M3,B) S(˜M4,B) Recognition Result
    S1 [11] 0.73 0.80 0.78 0.73 ˜M2
    SD [6] 0.82 0.91 0.86 0.84 ˜M2
    SH1 0.32 0.36 0.33 0.28 ˜M2
    Sh1 0.38 0.45 0.43 0.34 ˜M2

     | Show Table
    DownLoad: CSV

    We may determine that there is the most similarity between ˜M2 and B by taking into account the pattern recognition principle of IVIFSs, but the similarity measure S1 is unable to determine which of ˜M1 and ˜M4 is greater. Furthermore, the newly suggested similarity measures are more practical and capable of resolving this point. In addition, by using the similarity measures SH1 and Sh1 proposed in this paper, the same recognition results can be obtained. Hence, based on the recognition principle, we can classify patient B as suffering from disease ˜M2, thereby conclusively diagnosing them with typhoid illness.

    This paper introduces the axiomatic definition of the closest crisp set for IVIFSs, along with its pertinent properties. Subsequently, leveraging the distance measure to the closest crisp set, a novel knowledge measure and entropy for IVIFSs are presented. Furthermore, several theorems are proven, and the interplay between knowledge measures and entropy is examined. Ultimately, the efficacy of the proposed method is validated through two concrete examples: The application of knowledge measures in MADM and similarity measures in pattern recognition.

    In the future, we will persist in exploring the application of IVIFS information measures in other domains and strive to develop superior and more rational models for the mutual conversion of these information measures.

    Chunfeng Suo: Writing-review & editing, supervision, project administration, funding acquisition; Le Fu: Conceptualization, Methodology, software, validation, writing-original draft, writing-review & editing; Jingxuan Chen: Software, validation, supervision, conceptualization; Xuanchen Li: Validation, writing-review. All authors have read and approved the final version of the manuscript for publication.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This paper was supported by National Science Foundation of China (Grant Nos: 11671244, 12071271), Natural Science Foundation of Jilin Province (Grant Nos: YDZJ202201ZYTS320) and the Sixth Batch of Jilin Province Youth Science and Technology Talent Lifting Project.

    The authors declare that there are no conflicts of interest in the publication of this paper.


    Acknowledgments



    We thank: participants for sharing their stories and experiences to further research; RESOLVE staff for their support in making this work a reality; our Albertan community agency partners for assisting in recruitment, including FearIsNotLove and Wheatland Crisis Society; Olivia Giacobbo (OG) for her assistance in conducting interviews; Keira Griggs for her support in finalizing the manuscript; Drs. Scott Patten and Jennifer Woo for their medical expertise to help describe the hypervigilance and anxiety phenomenon of phantom stalking; and the Prairieaction Foundation for funding of this research.

    Ethics approval of research and informed consent



    Prior to participating in the interviews and studies, participants provided written informed consent via signatures. Ethical approval for both studies was obtained from the University of Calgary Conjoint Health Research Ethics Board (REB20-1461_REN3, REB20-1241_REN6).

    Conflict of interest



    The authors declare no conflict of interest.

    [1] Krug EG, Mercy JA, Dahlberg LL, et al. (2002) The world report on violence and health. Lancet 360: 1083-1088. https://doi.org/10.1016/S0140-6736(02)11133-0
    [2] Cotter A (2021) Intimate partner violence in Canada, 2018: an overview. Juristat: Canadian Centre for Justice Statistics : 1-23. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00003-eng.htm.
    [3] Coleman FL (1997) Stalking behavior and the cycle of domestic violence. J Interpers Violence 12: 420-432. https://doi.org/10.1177/088626097012003007
    [4] Mechanic MB, Weaver TL, Resick PA (2000) Intimate partner violence and stalking behavior: exploration of patterns and correlates in a sample of acutely battered women. Violence Vict 15: 55-72.
    [5] Government of Canada, Criminal Code (R.S.C., 1985, c. C-46). Ontario Government of Canada, 2023. Available from: https://laws-lois.justice.gc.ca/eng/acts/c-46/section-264.html#:~:text=264%20(1)%20No%20person%20shall,or%20the%20safety%20of%20anyone
    [6] Braveman P, Gottlieb L (2014) The social determinants of health: it's time to consider the causes of the causes. Public Health Rep 129: 19-31. https://doi.org/10.1177/00333549141291s206
    [7] Bauer GR, Churchill SM, Mahendran M, et al. (2021) Intersectionality in quantitative research: a systematic review of its emergence and applications of theory and methods. SSM Popul Health 14: 100798. https://doi.org/10.1016/j.ssmph.2021.100798
    [8] Kattari SK, Walls NE, Speer SR (2017) Differences in experiences of discrimination in accessing social services among transgender/gender nonconforming individuals by (dis)ability. J Soc Work Disabil Rehabil 16: 116-140. https://doi.org/10.1080/1536710x.2017.1299661
    [9] Kattari SK, Walls NE, Whitfield DL, et al. (2017) Racial and ethnic differences in experiences of discrimination in accessing social services among transgender/gender-nonconforming people. J Ethn Cult Diversit 26: 217-235. https://doi.org/10.1080/15313204.2016.1242102
    [10] Statistics Canada, Section 3: Police-reported intimate partner violence in Canada, 2019. Ontario Statistics Canada, 2021. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00001/03-eng.htm
    [11] Faller YN, Wuerch MA, Hampton MR, et al. (2021) A web of disheartenment with hope on the horizon: intimate partner violence in rural and northern communities. J Interpers Violence 36: 4058-4083. https://doi.org/10.1177/0886260518789141
    [12] Peek-Asa C, Wallis A, Harland K, et al. (2011) Rural disparity in domestic violence prevalence and access to resources. J Womens Health 20: 1743-1749. https://doi.org/10.1089/jwh.2011.2891
    [13] Cao L, Wang SYK (2020) Correlates of stalking victimization in Canada: a model of social support and comorbidity. Int J Law Crime Justice 63: 100437. https://doi.org/10.1016/j.ijlcj.2020.100437
    [14] Brownridge DA (2008) Understanding the elevated risk of partner violence against aboriginal women: a comparison of two nationally representative surveys of Canada. J Fam Viol 23: 353-367. https://doi.org/10.1007/s10896-008-9160-0
    [15] Panchuk K, Hart C, Lewchuk DR (2022) Women+ and intimate partner violence in rural, remote and northern communities. Rural and Northern Social Work Practice: Canadian Perspectives .
    [16] Statistics Canada, Population growth in Canada's rural areas, 2016 to 2021. Ontario Statistics Canada, 2022. Available from: https://www12.statcan.gc.ca/census-recensement/2021/as-sa/98-200-x/2021002/98-200-x2021002-eng.cfm
    [17] Jaffray B (2021) Intimate partner violence: experiences of sexual minority women in Canada, 2018. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00005-eng.htm
    [18] Jaffray B (2021) Intimate partner violence: experiences of sexual minority men in Canada, 2018. Juristat . Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00004-eng.htm.
    [19] Langenderfer-Magruder L, Walls NE, Whitfield DL, et al. (2020) Stalking victimization in LGBTQ adults: a brief report. J Interpers Violence 35: 1442-1453. https://doi.org/10.1177/0886260517696871
    [20] McCart MR, Smith DW, Sawyer GK (2010) Help seeking among victims of crime: a review of the empirical literature. J Trauma Stress 23: 198-206. https://doi.org/10.1002/jts.20509
    [21] Rollè L, Giardina G, Caldarera AM, et al. (2018) When intimate partner violence meets same sex couples: a review of same sex intimate partner violence. Front Psychol 9: 1506. https://doi.org/10.3389/fpsyg.2018.01506
    [22] Daley A, Brotman S, MacDonnell JA, et al. (2020) A framework for enhancing access to equitable home care for 2SLGBTQ+ communities. Int J Environ Res Public Health 17: 7533. https://doi.org/10.3390/ijerph17207533
    [23] Henriquez NR, Ahmad N (2021) “The message is you don't exist”: exploring lived experiences of rural lesbian, gay, bisexual, transgender, queer/questioning (LGBTQ) people utilizing health care services. SAGE Open Nurs 7. https://doi.org/10.1177/23779608211051174
    [24] Abboud S, Veldhuis C, Ballout S, et al. (2022) Sexual and gender minority health in the Middle East and North Africa region: a scoping review. Int J Nurs Stud Adv 4: 100085. https://doi.org/10.1016/j.ijnsa.2022.100085
    [25] Javed S, Chattu VK (2021) Patriarchy at the helm of gender-based violence during COVID-19. AIMS Public Health 8: 32-35. https://doi.org/10.3934/publichealth.2021003
    [26] Kardashevskaya M, Arisman K, Novick J, et al. (2022) Responding to women who experience intimate partner violence in rural municipalities across the prairies: final report. Available from: https://www.umanitoba.ca/sites/resolve/files/2022-09/Rural%20IPV%20Final%20Report.pdf
    [27] Haller A, White S, Bresch L, et al. (2022) Examining the nature & context of intimate partner violence in 2SLGBTQ+ communities: final report. Available from: https://www.umanitoba.ca/sites/resolve/files/2022-09/2SLGBTQ%20Final%20Report.pdf
    [28] Statistics Canada, Illustrated Glossary: Rural area (RA). Ontario Statistics Canada, 2022. Available from: https://www150.statcan.gc.ca/n1/pub/92-195-x/2021001/geo/ra-rr/ra-rr-eng.htm
    [29] Woulfe JM, Goodman LA (2021) Identity abuse as a tactic of violence in LGBTQ communities: Initial validation of the identity abuse measure. J Interpers Violence 36: 2656-2676. https://doi.org/10.1177/0886260518760018
    [30] Chowdhury R (2023) The role of religion in domestic violence and abuse in UK muslim communities. Oxf J Law Relig 12: 178-198. https://doi.org/10.1093/ojlr/rwad008
    [31] McLemore A (2021) Stalking by way of the courts: Tennessee's abusive civil action law and why all states should adopt a similar approach to abusive Litigation in the family law context. UCLA Womens Law J 28: 333. https://doi.org/10.5070/L328155792
    [32] Statistics Canada, Census profile, 2021 census of population: profiles of a community or region: 98-316-X2021001. Ontario Statistics Canada, 2023. Available from: https://www150.statcan.gc.ca/n1/en/catalogue/98-316-X2021001
    [33] Sutton D (2023) Gender-related homicide of women and girls in Canada. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2023001/article/00003-eng.htm
    [34] Otter.ai (2019, August). Available from: https://otter.ai./
    [35] Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3: 77-101. https://doi.org/10.1191/1478088706qp063oa
    [36] Kurbatfinski S, Whitehead J, Hodge L, et al. (2023) 2SLGBTQQIA+ experiences of intimate partner abuse and help-seeking: an intersectional scoping review.
    [37] Capaldi DM, Knoble NB, Shortt JW, et al. (2012) A systematic review of risk factors for intimate partner violence. Partner Abuse 3: 231-280. https://doi.org/10.1891/1946-6560.3.2.231
    [38] Gilchrist G, Potts LC, Connolly DJ, et al. (2023) Experience and perpetration of intimate partner violence and abuse by gender of respondent and their current partner before and during COVID-19 restrictions in 2020: a cross-sectional study in 13 countries. BMC Public Health 23: 316. https://doi.org/10.1186/s12889-022-14635-2
    [39] Whitton SW, Lawlace M, Dyar C, et al. (2021) Exploring mechanisms of racial disparities in intimate partner violence among sexual and gender minorities assigned female at birth. Cultur Divers Ethnic Minor Psychol 27: 602-612. https://doi.org/10.1037/cdp0000463
    [40] Reyns BW, Scherer H (2018) Stalking victimization among college students: the role of disability within a lifestyle-routine activity framework. Crime Delinquency 64: 650-673. https://doi.org/10.1177/0011128717714794
    [41] Breiding MJ, Smith SG, Basile KC, et al. (2014) Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization—national intimate partner and sexual violence survey, United States, 2011. MMWR Surveill Summ 63: 1-18.
    [42] Reyns BW, Scherer H (2019) Disability type and risk of sexual and stalking victimization in a national sample: a lifestyle–routine activity approach. Crim Justice Behav 46: 628-647. https://doi.org/10.1177/0093854818809148
    [43] Statistics Canada, Family matters: to have kids or not to have kids: that is the question! Ontario Statistics Canada, 2023. Available from: https://www150.statcan.gc.ca/n1/pub/11-627-m/11-627-m2023006-eng.htm
    [44] Nikupeteri A, Katz E, Laitinen M (2021) Coercive control and technology-facilitated parental stalking in children's and young people's lives. J Gen Based Violence 5: 395-412. https://doi.org/10.1332/239868021X16285243258834
    [45] Humphreys C, Diemer K, Bornemisza A, et al. (2019) More present than absent: men who use domestic violence and their fathering. Child Fam Soc Work 24: 321-329. https://doi.org/10.1111/cfs.12617
    [46] Bristow SM, Jackson D, Power T, et al. (2022) Rural mothers' feelings of isolation when caring for a child chronic health condition: a phenomenological study. J Child Health Care 26: 185-198. https://doi.org/10.1177/13674935211007324
    [47] Logan TK, Stevenson E, Evans L, et al. (2004) Rural and urban women's perceptions of barriers to health, mental health, and criminal justice services: implications for victim services. Violence Vict 19: 37-62. https://doi.org/10.1891/vivi.19.1.37.33234
    [48] Anderson KM, Renner LM, Bloom TS (2014) Rural women's strategic responses to intimate partner violence. Health Care Women Int 35: 423-441. https://doi.org/10.1080/07399332.2013.815757
    [49] Riddell T, Ford-Gilboe M, Leipert B (2009) Strategies used by rural women to stop, avoid, or escape from intimate partner violence. Health Care Women Int 30: 134-159. https://doi.org/10.1080/07399330802523774
    [50] Bocij P, McFarlane L (2003) Cyberstalking: the technology of hate. Police J 76: 204-221. https://doi.org/10.1350/pojo.76.3.204.19442
    [51] Fraser C, Olsen E, Lee K, et al. (2010) The new age of stalking: technological implications for stalking. Juv Fam Court J 61: 39-55. https://doi.org/10.1111/j.1755-6988.2010.01051.x
    [52] Castro Á, Barrada JR (2020) Dating apps and their sociodemographic and psychosocial correlates: a systematic review. Int J Environ Res Public Health 17: 6500. https://doi.org/10.3390/ijerph17186500
    [53] Blackwell C, Birnholtz J, Abbott C (2015) Seeing and being seen: co-situation and impression formation using Grindr, a location-aware gay dating app. New Media Soc 17: 1117-1136. https://doi.org/10.1177/1461444814521595
    [54] Kaur P, Dhir A, Tandon A, et al. (2021) A systematic literature review on cyberstalking. An analysis of past achievements and future promises. Technol Forecast Soc 163: 120426. https://doi.org/10.1016/j.techfore.2020.120426
    [55] Ogbe E, Harmon S, Van den Bergh R, et al. (2020) A systematic review of intimate partner violence interventions focused on improving social support and/ mental health outcomes of survivors. PLoS One 15: e0235177. https://doi.org/10.1371/journal.pone.0235177
    [56] Benitez CT, McNiel DE, Binder RL (2010) Do protection orders protect?. J Am Acad Psychiatry Law 38: 376-385.
    [57] Holt VL, Kernic MA, Wolf ME, et al. (2003) Do protection orders affect the likelihood of future partner violence and injury?. Am J Prev Med 24: 16-21. https://doi.org/10.1016/s0749-3797(02)00576-7
    [58] Holt VL, Kernic MA, Lumley T, et al. (2002) Civil protection orders and risk of subsequent police-reported violence. JAMA 288: 589-594. https://doi.org/10.1001/jama.288.5.589
    [59] McFarlane J, Malecha A, Gist J, et al. (2004) Protection orders and intimate partner violence: an 18-month study of 150 black, Hispanic, and white women. Am J Public Health 94: 613-618. https://doi.org/10.2105/ajph.94.4.613
    [60] Logan TK, Walker R (2010) Civil protective order effectiveness: justice or just a piece of paper?. Violence Vict 25: 332-348. https://doi.org/10.1891/0886-6708.25.3.332
    [61] Carlson MJ, Harris SD, Holden GW (1999) Protective orders and domestic violence: risk factors for re-abuse. J Fam Violence 14: 205-226. https://doi.org/10.1023/A:1022032904116
    [62] Koshan J (2023) Preventive justice? Domestic violence protection orders and their intersections with family and other laws and legal systems. Can J Fam L 35: 241. https://doi.org/10.2139/ssrn.4372318
    [63] American Psychiatric Association (2013) Diagnostic and Statistical Manual of Mental Disorders (DSM-5). 5 Eds., Washington: American Psychiatric Association. https://doi.org/10.1176/appi.books.9780890425596
    [64] Zimmermann K, Carnahan LR, Paulsey E, et al. (2016) Health care eligibility and availability and health care reform: Are we addressing rural women's barriers to accessing care?. J Health Care Poor Underserved 27: 204-219. https://doi.org/10.1353/hpu.2016.0177
    [65] Sankar P, Mora S, Merz JF, et al. (2003) Patient perspectives of medical confidentiality: a review of the literature. J Gen Intern Med 18: 659-669. https://doi.org/10.1046/j.1525-1497.2003.20823.x
    [66] Sabri B, Tharmarajah S, Njie-Carr VPS, et al. (2022) Safety planning with marginalized survivors of intimate partner violence: challenges of conducting safety planning intervention research with Marginalized women. Trauma Violence Abuse 23: 1728-1751. https://doi.org/10.1177/15248380211013136
    [67] Natarajan M (2016) Police response to domestic violence: a case study of TecSOS mobile phone use in the London metropolitan police service. Polic J Policy Pract 10: 378-390. https://doi.org/10.1093/police/paw022
    [68] Hearn J, Hall M, Lewis R, et al. (2023) The spread of digital intimate partner violence: ethical challenges for business, workplaces, employers and management. J Bus Ethics 187: 695-711. https://doi.org/10.1007/s10551-023-05463-4
    [69] Waite S, Pajovic V, Denier N (2010) Lesbian, gay and bisexual earnings in the Canadian labor market: new evidence from the Canadian community health survey. Res Soc Strat Mobil 67: 100484. https://doi.org/10.1016/j.rssm.2020.100484
    [70] Coy M, Scott E, Tweedale R, et al. (2015) “It's like going through the abuse again”: domestic violence and women and children's (un) safety in private law contact proceedings. J Soc Welf Fam Law 37: 53-69. https://doi.org/10.1080/09649069.2015.1004863
  • medsci-11-03-020-s001.pdf
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1628) PDF downloads(62) Cited by(0)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog