6 resultados para perpetrators

em Aston University Research Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The management of sleep is embedded within the social context of individuals' lives. This article is based on an exploratory study using focus groups of the sleep problems encountered by 17 women survivors of domestic violence. It argues that fear becomes the organizing framework for the management of sleep and illustrates how this takes place both while living with the perpetrators of violence and after the women have been rehoused. It argues that sleep deprivation is a method used by the perpetrators to exert control over women and that this has long-term implications for women's physical and mental health. © 2007 Sage Publication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Domestic violence is everywhere and nowhere. No statutory organization or health service has work with either perpetrators or survivors of domestic violence (usually women and children) as the primary focus of their service, yet all agencies will have very significant numbers among their clients/service users. It is therefore crucial that the policy framework is developed both within and between agencies to address the need, and scope, of intervention in this area and particularly the impact on children. Currently, significant steps have been taken by some agencies in the UK to address this previously neglected issue, though the developments are patchy. This paper draws on a UK-wide research study which mapped the extent and range of service provision for families where there is domestic violence and also developed a framework of good practice indicators for ‘Mapped the extent and range of service provision for families where there is domestic violence and also developed a framework of good practice indicators’ provision in this area. This article examines one of the indicators of good practice arising from the research—that of policy development—within social service departments and within the multi-agency arena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article uses a research project into the online conversations of sex offenders and the children they abuse to further the arguments for the acceptability of experimental work as a research tool for linguists. The research reported here contributes to the growing body of work within linguistics that has found experimental methods to be useful in answering questions about representation and constraints on linguistic expression (Hemforth 2013). The wider project examines online identity assumption in online paedophile activity and the policing of such activity, and involves dealing with the linguistic analysis of highly sensitive sexual grooming transcripts. Within the linguistics portion of the project, we examine theories of idiolect and identity through analysis of the ‘talk’ of perpetrators of online sexual abuse, and of the undercover officers that must assume alternative identities in order to investigate such crimes. The essential linguistic question in this article is methodological and concerns the applicability of experimental work to exploration of online identity and identity disguise. Although we touch on empirical questions, such as the sufficiency of linguistic description that will enable convincing identity disguise, we do not explore the experimental results in detail. In spite of the preference within a range of discourse analytical paradigms for ‘naturally occurring’ data, we argue that not only does the term prove conceptually problematic, but in certain contexts, and particularly in the applied forensic context described, a rejection of experimentally elicited data would limit the possible types and extent of analyses. Thus, it would restrict the contribution that academic linguistics can make in addressing a serious social problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One routine “common sense” means of explaining sexual violence is the ideologically facilitated tendency to blame the victim, and previous research has identified patterns of victim-blaming in the talk of perpetrators of rape, and also in that of the professionals who deal with rape in their day-to-day work. This article focuses on the discursive resources drawn on in police interviews by rape victims themselves as they attempt to account for their own behaviour in relation to the attack. It identifies and describes points within interviewees’ talk where they produce “accounts” (Potter and Wetherell, 1987), and considers what these tell us about the participants’ shared understanding of what is relevant to the on-going talk. Occasions when there is evidence of a mis-match in the understanding of the participants will also be discussed. The analyses illustrate that for the accounts of interviewees to be heard as relevant, a number of prevalent and problematic themes of victim-blaming must be assumed. Interviewees anticipate and pre-empt implications that various aspects of their own behaviour contributed to their attack, and interviewers vary in the level of skill they display at negotiating these shared understandings.