103 resultados para victim blaming


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines the general impressions and blame attributions of Trinidadian university students in cases of sexual assault. Participants were 132 female students from the University of the West Indies, Faculty of Social Sciences. Each respondent read one of four sexual assault scenarios, in which victim and perpetrator gender were varied. Participants' impressions of the incident, opinions about each party's behaviour, blame attributions, attitudes about reporting the incident to the police, desired outcome, and their reasons for these were then assessed. Consistent with Burt's rape myth theory, the qualitative and quantitative results showed a tendency for participants to attribute an internal locus of control to female victims, and to blame them more than males. Although same sex events evoked significantly more emotional and disgust-related reactions, these reactions did not translate into different seriousness scores, or different ideas about whether the victim should report the incident to the police. Although respondents showed an ability to separate their initial reactions from their attitudes about the legal status of the event, many of the response patterns indicated gender role biases on the part of these future professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research has suggested that child sex offenders hold thematically distinct cognitive distortions, which Ward and Keenan (1999) call Implicit Theories. The aim of this preliminary study was to investigate the relationship between offenders’ Implicit Theories and their personality related cognitions. The variables were measured using the Implicit Theory Questionnaire and Millon’s (1990) MCMI-III personality scales. Subjects were 28 male sex offenders against children serving a custodial sentence in New Zealand, who elected to participate in a treatment program. A majority of participants had personality scale scores that reached the clinical threshold. Results found that dependant, depressive and schizoidal personality patterns significantly correlated with Implicit Theories. Clinical and theoretical implications are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current study examines sexual and violent reoffence rates for a sample of 2474 sexual offenders over an average of 15 years following release from prison. Reoffence rates are reported as a function of the offenders' victim type and level of risk as assessed by the Automated Sexual Recidivism Scale, a computer scored measure of relevant historical risk factors. Observed sexual recidivism rates for offenders with child victims, adult victims, and mixed victims were quite similar. Results indicate that offenders with exclusively female child victims not only showed a lower rate of sexual reoffending, but that the reoffence rates were relatively low across all levels of actuarial risk. In contrast, those with male child victims and adult victims showed a pronounced escalation of reoffence rates as actuarial risk increased. Results also indicated that adult victim offenders are less consistent in the victim type of their reoffences, with 37% sexually reoffending against child victims. Finally, combined rates of sexual and violent reoffending were particularly high for those with adult victim sexual offence histories. Risk assessment and public policy implications are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Framework for human rights protection in Australia - report of the National Human Rights Consultation Committee - the role of resolution of human rights complaints in the enforcement of human rights - use of alternative dispute resolution (ADR) - current role of the Australian Human Rights Commission (AHRC) - future role as an advocator and crusader for victims of human rights abuses - need for recognition and protection of the special status of the AHRC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article offers a joint reading of two cultural texts that reflect the contest over victim-oriented characterizations of queer youth in contemporary culture. The first text is a representation of queer youth taken from the popular UK television series Shameless (2004). The second text is an online discussion about representations of gay and lesbian characters on television that was recently posted on the Queer Youth Network website. Through my reading of these two texts, I explore the rise of explicit mainstream representations of gay and lesbian characters and the emergence of an identifiable queer youth audience as key characteristics of the contemporary 'after-queer' moment. Through a reflection on the queer youth analytical techniques observable on the Queer Youth Network site, I conclude by outlining some key implications for future educational research in the field of youth, sexuality and popular culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the study, a cohort of 440 child sexual abuse cases were used to model the effect of victim age on police authorisation of charges. Linear and quadratic effects of age were modelled in a logistic regression that controlled for case characteristics and evidence. The quadratic effect of victim age was strengthened when control variables were included in the model and the linear effect of age was not significant in the final model. The results indicated that cases involving victims in middle childhood had a higher proportion of suspects charged than cases involving victims in early childhood and adolescence. Possible mediators of the relationship between victim age and charges were explored and it was found that cases with older victims had a higher prevalence of extra-familial abuse and suspect confessions, and these factors had a positive effect on the proportion of suspects charged. Possible explanations for the quadratic effect of victim age and mediation are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the news media coverage surrounding the death of Aboriginal man Trevor Duroux, who was killed by a coward's punch. The 'big' media failed to pay this tragic death any attention. The articles attempts to explain why.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The modification of deviant cognitions and the enhancement of victim empathy are central components in many treatment programs for sex offenders. There appear to be three broad problems with self-report measures of these factors: variations in the psychometric evaluation of measures; the transparency of items and thus the likely influence of social desirability; and the difficulty of determining which measures are specific to particular types of sex offenders. The aim of this study was to investigate these three issues among child molesters (CMs), and men convicted of sex offences against adults (ASOs). Data were collected from 36 CMs and 31 ASOs and from two comparison groups (33 men convicted of nonsexual offences and 40 nonoffenders from the community), to assess the reliability (internal and test-retest) and validity (discriminant, construct, and face) of measures, the influence of sexual social desirability on responding and the specificity of measures to both sex offender groups. Collectively, the results raise issues related to the assessment of sex offenders that require further investigation. They also have theoretical implications about the relationship between cognitive and emotive processes among sex offenders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper focuses on the construction of my post-operatively scarred body as a mine site, my experiences with reconstructively normalizing its appearance as a cyborg, and the implications for my work as an environmental educator  interested in how the body of a theorist is presented within theoretical spaces. The paper is not a victim's story as such, but rather a response to the  hypothesis that illness is a call for stories, that the body needs a voice that disease and illness take away. It relates Donna Haraway's notions of the cyborg and other feminist poststructuralist work to both my living body and the body of my curriculum work in environmental education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stalking is a prevalent crime which can significantly compromise the victim's quality of life. It occurs when one person repeatedly inflicts on another unwanted contacts or communications which induce fear. Many of the behaviours associated with stalking overlap with common, albeit irritating, experiences (e.g. being persistently telephoned or approached for a date). The difficulty for victims is recognizing the difference between brief episodes of intrusiveness or social awkwardness, and the beginnings of a more persistent campaign of harassment. This study sought to define empirically the foremost juncture at which instances of intrusiveness can be distinguished from persistent stalking which is ultimately damaging to the victim's psychosocial functioning. The results indicate that continuation of unwanted intrusions beyond a threshold of 2 weeks is associated with a more intrusive, threatening and psychologically damaging course of harassment. Recognition that 2 weeks is the watershed between brief, self-limiting instances of intrusiveness and protracted stalking allows an opportunity for early intervention to assist victims of this crime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can discover the attacks more timely from both source end and victim end, fight the attacks with more resources and take advantage of more flexible strategies. This paper investigates 7 distributed defense systems which make use of various strategies to mitigate the DDoS attacks. Different architectures are designed in these 7 systems to provide distributed DDoS defense solutions. We evaluate these systems in terms of deployment, detection, response, security, robustness and implementation. For each criteria, we give a recommendation on which technologies are best suitable for a successful distributed defense system based on the analysis result. Finally we propose our idea on the design of an effective distributed defense system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays Distributed Denial of Service (DDoS) attacks have made one of the most serious threats to the information infrastructure. In this paper we firstly present a new filtering approach, Mark-Aided Distributed Filtering (MADF), which is to find the network anomalies by using a back-propagation neural network, deploy the defense system at distributed routers, identify and filtering the attack packets before they can reach the victim; and secondly propose an analytical model for the interactions between DDoS attack party and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. According to the experimental results, we find that MADF can detect and filter DDoS attack packets with high sensitivity and accuracy, thus provide high legitimate traffic throughput and low attack traffic throughput. Through the comparison between experiments and numerical results, we also demonstrate the validity of the analytical model that can precisely estimate the effectiveness of a DDoS defense system before it encounters different attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Currently high-speed networks have been attacked by successive waves of Distributed Denial of Service (DDoS) attacks. There are two major challenges on DDoS defense in the high-speed networks. One is to sensitively and accurately detect attack traffic, and the other is to filter out the attack traffic quickly, which mainly depends on high-speed packet classification. Unfortunately most current defense approaches can not efficiently detect and quickly filter out attack traffic. Our approach is to find the network anomalies by using neural network, deploy the system at distributed routers, identify the attack packets, and then filter them quickly by a Bloom filter-based classifier. The evaluation results show that this approach can be used to defend against both intensive and subtle DDoS attacks, and can catch DDoS attacks’ characteristic of starting from multiple sources to a single victim. The simple complexity, high classification speed and low storage requirements make it especially suitable for DDoS defense in high-speed networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A substantial proportion of past research on rapists has focused on their motives. This paper reports on two studies that investigated the behavioural characteristics of rapists. The first study gathered behavioural data from police rape files to determine the types of behaviours exhibited by 130 men charged with rape. The second study was designed to validate the behavioural clusters found in study 1, using the transcripts of court cases from a sample of 50 accused rapists. The results demonstrated a high level of consistency in the behaviours of the accused rapists in the two studies. Rapists were most frequently a stranger, the rape occurred frequently in the victim's home, and the rapist used a range of different ways to communicate verbally with his victim. Five behavioural themes were identified in both studies: vaginal, kissing/fondling, oral, anal and brutal/physical themes. This analysis of the behavioural aspects of rape provides an understanding of the types of behaviours exhibited by men who reach the stage of court proceedings for the crime of rape. The difference between the current behavioural profile and that reported by members of the general community who have experienced rape is discussed.