14 resultados para victim blaming

em Aston University Research Archive


Relevância:

60.00% 60.00%

Publicador:

Resumo:

One routine “common sense” means of explaining sexual violence is the ideologically facilitated tendency to blame the victim, and previous research has identified patterns of victim-blaming in the talk of perpetrators of rape, and also in that of the professionals who deal with rape in their day-to-day work. This article focuses on the discursive resources drawn on in police interviews by rape victims themselves as they attempt to account for their own behaviour in relation to the attack. It identifies and describes points within interviewees’ talk where they produce “accounts” (Potter and Wetherell, 1987), and considers what these tell us about the participants’ shared understanding of what is relevant to the on-going talk. Occasions when there is evidence of a mis-match in the understanding of the participants will also be discussed. The analyses illustrate that for the accounts of interviewees to be heard as relevant, a number of prevalent and problematic themes of victim-blaming must be assumed. Interviewees anticipate and pre-empt implications that various aspects of their own behaviour contributed to their attack, and interviewers vary in the level of skill they display at negotiating these shared understandings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research has found evidence of a link between being overweight or obese and bullying/peer victimisation, and also between obesity and adjustment problems such as low self-esteem and body dissatisfaction. Studies have also found that adjustment problems can put children at an increased risk of being bullied over time. However, to date the factors that place overweight or obese children at risk of being bullied have been poorly elucidated. Self-report data were collected from a sample of 11-14 year olds (N=376) about their weight status, about their experiences of three different types of bullying (Verbal, Physical and Social), their global self-worth, self-esteem for physical appearance, and body dissatisfaction. Overweight or obese children reported experiencing significantly more verbal and physical (but not social) bullying than their non-overweight peers. Global self-worth, self-esteem for physical appearance and body dissatisfaction each fully mediated the paths between weight status and being a victim of bullying.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The methods used by the UK Police to investigate complaints of rape have unsurprisingly come under much scrutiny in recent times, with a 2007 joint report on behalf of HM Crown Prosecution Service Inspectorate and HM Inspectorate of Constabulary concluding that there were many areas where improvements should be made. The research reported here forms part of a larger project which draws on various discourse analytical tools to identify the processes at work during police interviews with women reporting rape. Drawing on a corpus of video recorded police interviews with women reporting rape, this study applies a two pronged analysis to reveal the presence of these ideologies. Firstly, an analysis of the discourse markers ‘well’ and ‘so’ demonstrates the control exerted on the interaction by interviewing officers, as they attach importance to certain facts while omitting much of the information provided by the victim. Secondly, the interpretative repertoires relied upon by officers to ‘make sense’ of victim’s accounts are subject to scrutiny. As well as providing micro-level analyses which demonstrate processes of interactional control at the local level, the findings of these analyses can be shown to relate to a wider context – specifically prevailing ideologies about sexual violence in society as a whole.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In popular British understanding the terms 'sleeping' or 'slept' are often used to mean sex, and (hetero)sex is seen as crucial to sustaining intimate relationships. This study of UK newspapers coverage shows that stories about sieep and sleeping arrangements can be seen to (re)produce heteronormativity through focusing on the (heterosexual) 'marital bed'. The 'marital bed' is constructed as both the physical and symbolic centre of successful heterosexual relationships. Moreover, the maintenance of this symbolic space is gendered with women given primary responsibility. The focus on the 'marital bed' helps to exclude non-heterosexuals from the idea of intimate relationships, by effectively silencing their experiences of sleep and sleeping arrangements. Normative ideas about male and female (hetero)sexualities are drawn on to undermine women's right to refuse sex within the martial bed. In addition, the term 'sleep-sex' is used to reconceptualise stories of rape, minimising the victim's experiences and absolve the perpetrator from full responsibility for the assault. By exploring these articles we can see both how the representation of the organisation of sleep is produced through heteronormativity, as well as how heteronormativity determines whose accounts of sleeping are prioritised. © Sociological Research Online.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding factors that affect the severity of a juvenile-stranger sexual assault has implications for crime prevention, and potentially, the assessment and treatment of juvenile sex offenders. This study investigated how victim characteristics and the number of suspects affected the use of physical violence and weapons and the occurrence of penetration in 495 allegations of sexual assault committed by juveniles against strangers. Statistically significant interactions between victim age and gender were found for occurrence of penetration and use of violence. Differences in offense characteristics were also found between offenses with varying victim-suspect age differences. When comparing the rate of penetration in the presence and absence of violence, little change was observed for lone suspects. However, the rate of penetration increased significantly for groups in the presence of physical violence, suggesting that violence in this context may be more expressive than instrumental. Theoretical explanations and practical implications are considered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is organised into four parts. In Part 1 relevant literature is reviewed and presented in three chapters. Chapter 1 examines legal and cultural factors in identifying the. boundaries of rape. Chapter 2 discusses idiographic features· and causal characteristics of rape suspects and victims. Chapter 3 reviews the evidence relating to attitudes toward rape,. attribution of responsibility to victims and the routine management of rape cases by the police. Part II comprises an experimental investigation of observer perception of the victims of violent crime. The experiment, examined the processes by which impressions were attributed to victims of personal crime. The results suggested that discrepancies from observers' stereotypes were an important factor in their polarisation of victim ratings. The relevance of. examining . both the structure and process of' impression, formation was highlighted. Part III describes an extensive field study in which the West. Midlands police files on rape for an eight year period (1071-1978) were analysed. The study revealed a large number of interesting findings related to a wide range of relevant features of the crime. Further, the impact .of common misconceptions and "myths" of rape were investigated across the legal and judicial processing of rape cases. The evidence suggests that these "myths" lead·to differential biasing effects at different stages in the process. In the final part of this thesis,. salient issues raised by the experiment and field study .are discussed·within the framework outlined in Part 1. Potential implications for future developments and research: are presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The number of fatal accidents in the agricultural, horticultural and forestry industry in Great Britain has declined from an annual rate of about 135 in the 1960's to its current level of about 50. Changes to the size and makeup of the population at risk mean that there has been no real improvement in fatal injury incidence rates for farmers. The Health and Safety Executives' (HSE) current system of accident investigation, recording, and analysis is directed primarily at identifying fault, allocating blame, and punishing wrongdoers. Relatively little information is recorded about the personal and organisational factors that contributed to, or failed to prevent accidents. To develop effective preventive strategies, it is important to establish whether errors by the victims and others, occur at the skills, rules, or knowledge level of functioning: are violations of some rule or procedure; or stem from failures to correctly appraise, or control a hazard. A modified version of the Hale and Glendon accident causation model was used to study 230 fatal accidents. Inspectors' original reports were examined and expert judgement applied to identify and categorise the errors committed by each of the parties involved. The highest proportion of errors that led directly to accidents occurred whilst the victims were operating at the knowledge level. The mix and proportion of errors varied considerably between different classes of victim and kind of accident. Different preventive strategies will be needed to address the problem areas identified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What does it mean to be white and working class in modern Britain? The Joseph Rowntree Foundation’s studies of traditionally white estates in Bradford, London, Coventry and Birmingham are part of a growing body of research into ‘white identities’. This paper: • identifies common findings from JRF research into traditionally white estates, in the context of other similar work; • suggests how issues of white identity can be better understood and makes recommendations for policy and practice. Key points: • Profound economic and social change has increased isolation and fear in traditionally white estates. Residents often claim that things were better in the past. • ‘Estatism’ refers to specific social dynamics associated with council estates and prejudice towards residents based on where they live. This can result in lowered self-esteem and reluctance to participate in community campaigns. • People on traditionally white estates often feel they are not listened to by outside agencies. Consultations can raise hopes but ultimately reinforce disengagement. Initiatives to ensure equality have become associated with political correctness (‘PC’). • White working-class people feel they are bound by values of hard work, reciprocity and support. They are frustrated by the closure and lack of access to community facilities. The social class system simultaneously disadvantages the working class while giving advantage to other classes. • There is a strong desire for allocation of resources to be fair, with a widespread perception that minorities are given preference. Blaming incomers for decline is common, with the target of blame differing between sites. Participants did not want to be considered racist and felt that labelling ideas as racist prevents discussion. Similarly, the term ‘PC’ can also be used to shut down debate. • Recommendations include community-twinning, new ways of accessing local authorities, involvement from the private sector in disadvantaged areas and local panels to define and develop the ‘Big Society’. Initiatives aimed solely at white working-class people are unlikely to be successful.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyberstalking describes a relatively new form of stalking behaviour where technology is used as the medium of harassment. The term corporate cyberstalking is often used to describe incidents that involve organisations, such as companies and government departments. This paper uses a number of case studies in order to propose a typology of corporate cyberstalking. It is suggested that incidents involving corporate cyberstalking can be divided into two broad groups, depending on whether or not the organisation acts as a stalker or as a victim. Examining the motivations behind corporate cyberstalking allows these groups to be subdidvided further. The motives behind corporate cyberstalking can range from a desire for revenge against an employer to cyberterrorism. The paper also briefly discusses definitions of stalking and cyberstalking, concluding with a revised definition of cyberstalking that is more in keeping with the material discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background. Previous research has found links between being a victim of bullying and reporting more unhealthy eating behaviours and cognitions, particularly in girls. However, little is known about the factors that might mediate these relationships. Aim. The present study compared the relationships between bullying, emotional adjustment, restrained eating, and body dissatisfaction in adolescent boys and girls. Sample/method. Self-report data were collected from a sample of 11- to 14-year-olds (N= 376) on experiences of bullying, emotional symptoms, and unhealthy eating and shape-related attitudes and behaviours. Results. Bullying, emotional symptoms, restrained eating, and body dissatisfaction were all correlated. Emotional symptoms were found to significantly mediate the relationships between verbal bullying with body dissatisfaction in girls but not in boys. Conclusions. Findings suggest that the experience of being verbally bullied places adolescent girls at risk of developing emotional problems which can then lead to body dissatisfaction. Longitudinal research is necessary to disentangle these pathways in more detail to facilitate the development of informed interventions to support children who are being bullied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.